Linear and Nonlinear Optimization, Second Edition

  • 86 2 2
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up

Linear and Nonlinear Optimization, Second Edition

Linear and Nonlinear Optimization Linear and Nonlinear Optimization SECOND EDITION Igor Griva Stephen G. Nash Ariela

2,286 281 3MB

Pages 765 Page size 400 x 586.5 pts

Report DMCA / Copyright

DOWNLOAD FILE

Recommend Papers

File loading please wait...
Citation preview

Linear and Nonlinear Optimization

Linear and Nonlinear Optimization SECOND EDITION

Igor Griva Stephen G. Nash Ariela Sofer George Mason University Fairfax, Virginia

Society for Industrial and Applied Mathematics • Philadelphia

Copyright © 2009 by the Society for Industrial and Applied Mathematics. 10 9 8 7 6 5 4 3 2 1 All rights reserved. Printed in the United States of America. No part of this book may be reproduced, stored, or transmitted in any manner without the written permission of the publisher. For information, write to the Society for Industrial and Applied Mathematics, 3600 Market Street, 6th Floor, Philadelphia, PA 19104-2688 USA. Trademarked names may be used in this book without the inclusion of a trademark symbol. These names are used in an editorial context only; no infringement of trademark is intended. Excel is a trademark of Microsoft Corporation in the United States and/or other countries. Mathematica is a registered trademark of Wolfram Research, Inc. MATLAB is a registered trademark of The MathWorks, Inc. For MATLAB product information, please contact The MathWorks, Inc., 3 Apple Hill Drive, Natick, MA 01760-2098 USA, 508-647-7000, Fax: 508-647-7001, [email protected], www.mathworks.com. SAS is a registered trademark of SAS Institute Inc. Cover image of the Golden Gate Bridge used with permission of istockphoto.com. Cover designed by Galina Spivak. Library of Congress Cataloging-in-Publication Data Griva, Igor. Linear and nonlinear optimization / Igor Griva, Stephen G. Nash, Ariela Sofer. -- 2nd ed. p. cm. Includes bibliographical references and index. ISBN 978-0-898716-61-0 1. Linear programming. 2. Nonlinear programming. I. Nash, Stephen (Stephen G.) II. Sofer, Ariela. III. Title. T57.74.G75 2008 519.7'2--dc22 2008032477

is a registered trademark.

i

i

i

book 2008/10/23 page v i

Contents Preface

I 1

2

xiii

Basics

1

Optimization Models 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Optimization: An Informal Introduction . . . . . . . . . . . . . . 1.3 Linear Equations . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.4 Linear Optimization . . . . . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.5 Least-Squares Data Fitting . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.6 Nonlinear Optimization . . . . . . . . . . . . . . . . . . . . . . . 1.7 Optimization Applications . . . . . . . . . . . . . . . . . . . . . . 1.7.1 Crew Scheduling and Fleet Scheduling . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7.2 Support Vector Machines . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7.3 Portfolio Optimization . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7.4 Intensity Modulated Radiation Treatment Planning . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7.5 Positron Emission Tomography Image Reconstruction Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.7.6 Shape Optimization . . . . . . . . . . . . . . . . . . 1.8 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . .

3 3 4 7 10 12 12 14 14 18 18 22 22 24 25 27 28 31 32 34 35 40

Fundamentals of Optimization 2.1 Introduction . . . . . . . . . . . . . . . 2.2 Feasibility and Optimality . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . 2.3 Convexity . . . . . . . . . . . . . . . . 2.3.1 Derivatives and Convexity .

. . . . .

. . . . .

43 43 43 47 48 50

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

v

i

i i

i

i

i

i

vi

3

II 4

5

book 2008/10/23 page vi i

Contents Exercises . . . . . . . . . . . . . . . . . . . . . . . 2.4 The General Optimization Algorithm . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . 2.5 Rates of Convergence . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . 2.6 Taylor Series . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . 2.7 Newton’s Method for Nonlinear Equations . 2.7.1 Systems of Nonlinear Equations Exercises . . . . . . . . . . . . . . . . . . . . . . . 2.8 Notes . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

52 54 58 58 61 62 65 67 72 74 76

Representation of Linear Constraints 3.1 Basic Concepts . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . 3.2 Null and Range Spaces . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . 3.3 Generating Null-Space Matrices . . . . . . 3.3.1 Variable Reduction Method . 3.3.2 Orthogonal Projection Matrix 3.3.3 Other Projections . . . . . . 3.3.4 The QR Factorization . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . 3.4 Notes . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

. . . . . . . . . . .

77 77 82 82 84 86 86 89 90 90 91 93

. . . . . . . . . . .

Linear Programming Geometry of Linear Programming 4.1 Introduction . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . 4.2 Standard Form . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . 4.3 Basic Solutions and Extreme Points . . . Exercises . . . . . . . . . . . . . . . . . . . . . 4.4 Representation of Solutions; Optimality Exercises . . . . . . . . . . . . . . . . . . . . . 4.5 Notes . . . . . . . . . . . . . . . . . . .

95

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

97 97 98 100 105 106 114 117 123 124

The Simplex Method 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5.2 The Simplex Method . . . . . . . . . . . . . . . . . . . 5.2.1 General Formulas . . . . . . . . . . . . . . 5.2.2 Unbounded Problems . . . . . . . . . . . . 5.2.3 Notation for the Simplex Method (Tableaus) 5.2.4 Deficiencies of the Tableau . . . . . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

. . . . . .

125 125 126 129 134 135 139

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

i

i i

i

i

i

i

Contents

6

7

book 2008/10/23 page vii i

vii

Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3 The Simplex Method (Details) . . . . . . . . . . . . . 5.3.1 Multiple Solutions . . . . . . . . . . . . . 5.3.2 Feasible Directions and Edge Directions . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4 Getting Started—Artificial Variables . . . . . . . . . . 5.4.1 The Two-Phase Method . . . . . . . . . . 5.4.2 The Big-M Method . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5 Degeneracy and Termination . . . . . . . . . . . . . . 5.5.1 Resolving Degeneracy Using Perturbation Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

141 144 144 145 148 149 150 156 159 162 167 170 171

Duality and Sensitivity 6.1 The Dual Problem . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . 6.2 Duality Theory . . . . . . . . . . . . . 6.2.1 Complementary Slackness 6.2.2 Interpretation of the Dual Exercises . . . . . . . . . . . . . . . . . . . . 6.3 The Dual Simplex Method . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . 6.4 Sensitivity . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . 6.5 Parametric Linear Programming . . . . Exercises . . . . . . . . . . . . . . . . . . . . 6.6 Notes . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

173 173 177 179 182 184 185 189 194 195 201 204 210 211

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Factorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . .

213 213 214 221 222 227 227 238 240 240 248 256 259 260 264 265 266

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

Enhancements of the Simplex Method 7.1 Introduction . . . . . . . . . . . . . . . . . . . . 7.2 Problems with Upper Bounds . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3 Column Generation . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . 7.4 The Decomposition Principle . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . 7.5 Representation of the Basis . . . . . . . . . . . . 7.5.1 The Product Form of the Inverse . . 7.5.2 Representation of the Basis—The LU Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . 7.6 Numerical Stability and Computational Efficiency 7.6.1 Pricing . . . . . . . . . . . . . . . . 7.6.2 The Initial Basis . . . . . . . . . . . 7.6.3 Tolerances; Degeneracy . . . . . . . 7.6.4 Scaling . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

i

i i

i

i

i

i

viii

Contents 7.6.5 Preprocessing 7.6.6 Model Formats Exercises . . . . . . . . . . . . . . 7.7 Notes . . . . . . . . . . . .

8

9

10

book 2008/10/23 page viii i

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

267 268 269 270

Network Problems 8.1 Introduction . . . . . . . . . . 8.2 Basic Concepts and Examples . Exercises . . . . . . . . . . . . . . . . 8.3 Representation of the Basis . . Exercises . . . . . . . . . . . . . . . . 8.4 The Network Simplex Method Exercises . . . . . . . . . . . . . . . . 8.5 Resolving Degeneracy . . . . . Exercises . . . . . . . . . . . . . . . . 8.6 Notes . . . . . . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

. . . . . . . . . .

271 271 271 280 280 287 287 294 295 299 299

Computational Complexity of Linear Programming 9.1 Introduction . . . . . . . . . . . . . . . . . . . . . 9.2 Computational Complexity . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.3 Worst-Case Behavior of the Simplex Method . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.4 The Ellipsoid Method . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.5 The Average-Case Behavior of the Simplex Method 9.6 Notes . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

301 301 302 304 305 308 308 313 314 316

Interior-Point Methods for Linear Programming 10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.2 The Primal-Dual Interior-Point Method . . . . . . . . . . . . . 10.2.1 Computational Aspects of Interior-Point Methods 10.2.2 The Predictor-Corrector Algorithm . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.3 Feasibility and Self-Dual Formulations . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.4 Some Concepts from Nonlinear Optimization . . . . . . . . . 10.5 Affine-Scaling Methods . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.6 Path-Following Methods . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.7 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

319 319 321 328 329 330 331 334 334 336 343 344 352 353

i

i i

i

i

i

i

Contents

ix

III Unconstrained Optimization 11

12

13

Basics of Unconstrained Optimization 11.1 Introduction . . . . . . . . . . . . . . . . . . . . . 11.2 Optimality Conditions . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.3 Newton’s Method for Minimization . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.4 Guaranteeing Descent . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.5 Guaranteeing Convergence: Line Search Methods . 11.5.1 Other Line Searches . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.6 Guaranteeing Convergence: Trust-Region Methods Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.7 Notes . . . . . . . . . . . . . . . . . . . . . . . . .

book 2008/10/23 page ix i

355

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

357 357 357 361 364 369 371 374 375 381 385 391 398 399

Methods for Unconstrained Optimization 12.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 12.2 Steepest-Descent Method . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.3 Quasi-Newton Methods . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.4 Automating Derivative Calculations . . . . . . . . . . . . 12.4.1 Finite-Difference Derivative Estimates . . . 12.4.2 Automatic Differentiation . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.5 Methods That Do Not Require Derivatives . . . . . . . . 12.5.1 Simulation-Based Optimization . . . . . . . 12.5.2 Compass Search: A Derivative-Free Method 12.5.3 Convergence of Compass Search . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.6 Termination Rules . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12.7 Historical Background . . . . . . . . . . . . . . . . . . . 12.8 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . .

401 401 402 408 411 420 422 422 426 429 431 432 434 437 440 441 445 446 448

Low-Storage Methods for Unconstrained Problems 13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.2 The Conjugate-Gradient Method for Solving Linear Equations Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.3 Truncated-Newton Methods . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.4 Nonlinear Conjugate-Gradient Methods . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13.5 Limited-Memory Quasi-Newton Methods . . . . . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

451 451 452 459 460 465 466 469 470

. . . . . . . . . . . . .

. . . . . . . . . . . . .

i

i i

i

i

i

i

x

Contents Exercises . . . . . . . . 13.6 Preconditioning Exercises . . . . . . . . 13.7 Notes . . . . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

IV Nonlinear Optimization 14

15

book 2008/10/23 page x i

473 474 477 478

481

Optimality Conditions for Constrained Problems 14.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.2 Optimality Conditions for Linear Equality Constraints . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.3 The Lagrange Multipliers and the Lagrangian Function . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.4 Optimality Conditions for Linear Inequality Constraints . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.5 Optimality Conditions for Nonlinear Constraints . . . . . . . . 14.5.1 Statement of Optimality Conditions . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.6 Preview of Methods . . . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.7 Derivation of Optimality Conditions for Nonlinear Constraints Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.8 Duality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.8.1 Games and Min-Max Duality . . . . . . . . . . . 14.8.2 Lagrangian Duality . . . . . . . . . . . . . . . . 14.8.3 Wolfe Duality . . . . . . . . . . . . . . . . . . . 14.8.4 More on the Dual Function . . . . . . . . . . . . 14.8.5 Duality in Support Vector Machines . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.9 Historical Background . . . . . . . . . . . . . . . . . . . . . . 14.10 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . . . .

483 483 484 489 491 493 494 501 502 503 508 510 514 515 520 522 523 526 532 534 538 542 543 546

Feasible-Point Methods 15.1 Introduction . . . . . . . . . . . . . 15.2 Linear Equality Constraints . . . . . Exercises . . . . . . . . . . . . . . . . . . . 15.3 Computing the Lagrange Multipliers Exercises . . . . . . . . . . . . . . . . . . . 15.4 Linear Inequality Constraints . . . . 15.4.1 Linear Programming . . Exercises . . . . . . . . . . . . . . . . . . . 15.5 Sequential Quadratic Programming . Exercises . . . . . . . . . . . . . . . . . . . 15.6 Reduced-Gradient Methods . . . . . Exercises . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

549 549 549 555 556 561 563 570 572 573 580 581 588

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

. . . . . . . . . . . .

i

i i

i

i

i

i

Contents

book 2008/10/23 page xi i

xi

15.7 Filter Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597 15.8 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598 16

V A

Penalty and Barrier Methods 16.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.2 Classical Penalty and Barrier Methods . . . . . . . . . . . . . . . . 16.2.1 Barrier Methods . . . . . . . . . . . . . . . . . . . . . 16.2.2 Penalty Methods . . . . . . . . . . . . . . . . . . . . . 16.2.3 Convergence . . . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.3 Ill-Conditioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.4 Stabilized Penalty and Barrier Methods . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.5 Exact Penalty Methods . . . . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.6 Multiplier-Based Methods . . . . . . . . . . . . . . . . . . . . . . . 16.6.1 Dual Interpretation . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.7 Nonlinear Primal-Dual Methods . . . . . . . . . . . . . . . . . . . . 16.7.1 Primal-Dual Interior-Point Methods . . . . . . . . . . . 16.7.2 Convergence of the Primal-Dual Interior-Point Method Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.8 Semidefinite Programming . . . . . . . . . . . . . . . . . . . . . . Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16.9 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

. . . . . . . . . . . . . . . . . . . . .

Appendices Topics from Linear Algebra A.1 Introduction . . . . . . . . . . . . . . . . . . . . . A.2 Eigenvalues . . . . . . . . . . . . . . . . . . . . . A.3 Vector and Matrix Norms . . . . . . . . . . . . . . A.4 Systems of Linear Equations . . . . . . . . . . . . A.5 Solving Systems of Linear Equations by Elimination A.6 Gaussian Elimination as a Matrix Factorization . . . A.6.1 Sparse Matrix Storage . . . . . . . . . A.7 Other Matrix Factorizations . . . . . . . . . . . . . A.7.1 Positive-Definite Matrices . . . . . . . A.7.2 The LDLT and Cholesky Factorizations A.7.3 An Orthogonal Matrix Factorization . . A.8 Sensitivity (Conditioning) . . . . . . . . . . . . . . A.9 The Sherman–Morrison Formula . . . . . . . . . . A.10 Notes . . . . . . . . . . . . . . . . . . . . . . . . .

601 601 602 603 610 613 617 618 619 623 623 626 626 635 638 640 641 645 647 649 654 656

659

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

. . . . . . . . . . . . . .

661 661 661 662 664 666 669 675 676 677 678 681 683 686 688

i

i i

i

i

i

i

xii B

C

book 2008/10/23 page xii i

Contents Other Fundamentals B.1 Introduction . . . . . . . . . . . . . . . . . . . B.2 Computer Arithmetic . . . . . . . . . . . . . . B.3 Big-O Notation, O(·) . . . . . . . . . . . . . . B.4 The Gradient, Hessian, and Jacobian . . . . . . B.5 Gradient and Hessian of a Quadratic Function . B.6 Derivatives of a Product . . . . . . . . . . . . . B.7 The Chain Rule . . . . . . . . . . . . . . . . . B.8 Continuous Functions; Closed and Bounded Sets B.9 The Implicit Function Theorem . . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

. . . . . . . . .

691 691 691 693 694 696 697 698 699 700

Software 703 C.1 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703

Bibliography

707

Index

727

i

i i

i

i

i

i

book 2008/10/23 page xiii i

Preface This book provides an introduction to the applications, theory, and algorithms of linear and nonlinear optimization. The emphasis is on practical aspects—modern algorithms, as well as the influence of theory on the interpretation of solutions or on the design of software. Two important goals of this book are to present linear and nonlinear optimization in an integrated setting, and to incorporate up-to-date interior-point methods in linear and nonlinear optimization. As an illustration of this unified approach, almost every algorithm in this book is presented in the form of a General Optimization Algorithm. This algorithm has two major steps: an optimality test, and a step that improves the estimate of the solution. This framework is general enough to encompass the simplex method and various interior-point methods for linear programming, as well as Newton’s method and active-set methods for nonlinear optimization. The optimality test in this algorithm motivates the discussion of optimality conditions for a variety of problems. The step procedure motivates the discussion of feasible directions (for constrained problems) and Newton’s method and its variants (for nonlinear problems). In general, there is an attempt to develop the material from a small number of basic concepts, emphasizing the interrelationships among the many topics. Our hope is that, by emphasizing a few fundamental principles, it will be easier to understand and assimilate the vast panorama of linear and nonlinear optimization. We have attempted to make accessible a number of topics that are not often found in textbooks. Within linear programming, we have emphasized the importance of sparse matrices on the design of algorithms, described computational techniques used in sophisticated software packages, and derived the primal-dual interior-point method together with the predictor-corrector technique. Within nonlinear optimization, we have included discussions of truncated-Newton methods for large problems, convergence theory for trust-region methods, filter methods, and techniques for alleviating the ill-conditioning in barrier methods. We hope that the book serves as a useful introduction to research papers in these areas. The book was designed for use in courses and course sequences that discuss both linear and nonlinear optimization. We have used consistent approaches when discussing the two topics, often using the same terminology and notation in order to emphasize the similarities between the two topics. However, it can also be used in traditional (and separate) courses in Linear Programming and Nonlinear Optimization—in fact, that is the way we use it in the courses that we teach. At the end of this preface are chapter descriptions and course outlines indicating these possibilities. xiii

i

i i

i

i

i

i

xiv

book 2008/10/23 page xiv i

Preface

We have also used the book for more advanced courses. The later chapters (and the later sections within chapters) contain a great deal of material that would be difficult to cover in an introductory course. The Notes at the ends of many sections contain pointers to research papers and other references, and it would be straightforward to use such materials to supplement the book. The book is divided into four parts plus appendices. Part I (Basics) contains material that might be used in a number of different topics. It is not intended that all of this material be presented in the classroom. Some of it might be irrelevant (as the sample course outlines illustrate). In other cases, material might be familiar to the students from other courses, or simple enough to be assigned as a reading exercise. The material in Part I could also be taught in stages, as it is needed. In a course on Nonlinear Optimization, for example, Chapter 4 (Representation of Linear Constraints) could be delayed until after Part III (Unconstrained Optimization). Our intention in designing Part I was to make the book as flexible as possible, and instructors should feel free to exploit this flexibility. Part II (Linear Programming) and Part III (Unconstrained Optimization) are independent of each other. Either one could be taught or read before the other. In addition, it is not necessary to cover Part II before going on to Part IV (Nonlinear Optimization), although the material in Part IV will benefit from an understanding of Linear Programming. The material in the appendices may already be familiar. If not, it could either be presented in class or left for students to read independently. Many sections in the book can be omitted without interrupting the flow of the discussions (detailed information on this is given below). Proofs of theorems and lemmas can similarly be omitted. Roughly speaking, it is possible to skip later sections within a chapter and later chapters within a part and move on to later chapters in the book. The book was organized in this way so that it would be accessible to a wider audience, as well as to increase its flexibility. Many of the exercises are computational. In some cases, pencil-and-paper techniques would suffice, but the use of a computer is recommended. We have not specified how the computer might be used, and we leave this up to the instructor. In courses with an emphasis on modeling, a specialized linear or nonlinear optimization package might be appropriate. In other courses, the students might be asked to program algorithms themselves. We leave these decisions up to the instructor. Some information about software packages can be found in Appendix C. In addition, some exercises depend on auxiliary data sets that can be found on the web site for the book: http://www.siam.org/books/ot108 In our own classes, we use the MATLAB® software package for class demonstrations and homework assignments. It allows us to demonstrate a great many techniques easily, and it allows students to program individual algorithms without much difficulty. It also includes (in its toolboxes) prepared algorithms for many of the optimization problems that we discuss. We have gone to considerable effort to ensure the accuracy of the material in this book. Even so, we expect that some errors remain. For this reason, we have set up an online page for errata. It can be obtained at the book Web site.

i

i i

i

i

i

i

Preface

book 2008/10/23 page xv i

xv

Using This Book This book is designed to be flexible. It can be read and taught in many different ways. The material in the appendices can be taught as needed, or left to the students to read independently. Also, all formally identified proofs can be omitted. Part II (Linear Programming) and Part III (Unconstrained Optimization) are independent of each other. Part II does not assume any knowledge of Calculus. Part IV (Nonlinear Optimization) does not assume that Part II has been read (with the exception of Section 14.4.1). The only “essential” chapters in Part II are Chapters 4 (Geometry of Linear Programming), 5 (The Simplex Method), and 6 (Duality). The only “essential” chapter in Part III is Chapter 11 (Basics of Unconstrained Optimization). The other chapters can be skipped. We now describe the chapters individually, pointing out various ways they can be used. The sample course outlines that follow indicate how chapters might be selected to construct individual courses (based on a 15-week semester).1 Part I: Basics • Chapter 1: Optimization Models. This chapter is self-contained and describes a variety of optimization models. Sections 1.3–1.5 are independent of one another. Section 1.6 includes more realistic models and assumes that the reader is familiar with the basic models described in the earlier sections. The subsections of Section 1.6 are independent of one another. • Chapter 2: Fundamentals of Optimization. For Part II, only Sections 2.1–2.4 are needed (and Section 2.3.1 can be omitted). For Parts III and IV the whole chapter is relevant. • Chapter 3: Representation of Linear Constraints. Sections 3.3.2–3.3.4 can be omitted (although Section 3.3.2 is needed for Part IV). This chapter is only relevant to Parts II and IV; it is not needed for Part III. Part II: Linear Programming • Chapter 4: Geometry of Linear Programming. All sections of this chapter are needed in Part II. • Chapter 5: The Simplex Method. Sections 5.1 and 5.2 are the most important. How the rest of the chapter is used depends on the goals of the instructor, in particular with regard to tableaus. In a number of examples, we use the full simplex tableau to display data for linear programs. Thus, it is necessary to be able to read these tableaus to extract information. This is the only use we make of the tableaus elsewhere in the book. It is not necessary to be able to manipulate these tableaus. 1 Throughout the book, the number of a section or subsection begins with the chapter number. That is, Section 10.3 refers to the third section in Chapter 10, and Section 16.7.2 refers to the second subsection in the seventh section of Chapter 16. Also, a reference to Appendix A.9 refers to the ninth section of Appendix A. A similar system is used for tables, examples, theorems, etc.; Figure 8.10 refers to the tenth figure in Chapter 8, for example. For exercises, however, the chapter number is omitted, e.g., Exercise 4.7 is the seventh exercise in Section 4 of the current chapter (unless another chapter is specified).

i

i i

i

i

i

i

xvi

book 2008/10/23 page xvi i

Preface • Chapter 6: Duality and Sensitivity. Sections 6.1 and 6.2 are the most important. The remaining sections can be skipped, if desired. If taught, we recommend that Sections 6.3–6.5 be taught in order, although Section 6.3 is only used in a minor way in the remaining two sections. It would be possible to stop after any section. Note: The remaining chapters in Part II are independent of each other. • Chapter 7: Enhancements of the Simplex Method. The sections in this chapter are independent of each other. The instructor is free to pick and choose material, with one partial exception: the discussion of the decomposition principle is easier to understand if column generation has already been read. • Chapter 8: Network Problems. In this chapter, the sections must be taught in order. It would be possible to stop after any section. • Chapter 9: Computational Complexity of Linear Programming. The first two sections contain basic material used in Sections 9.3–9.5. Ideally, the remaining sections should be taught in order, although Sections 9.4 and 9.5 are independent of each other. Even if some topics are not of interest, at least the introductory paragraphs of each section should be read. (Section 9.5 requires some knowledge of statistics.) • Chapter 10: Interior-Point Methods for Linear Programming. Sections 10.1 and 10.2 are the most important. The later sections could be skipped but, if taught, Sections 10.4–10.6 should be taught in order. Section 10.4 reviews some fundamental concepts from nonlinear optimization needed in Sections 10.5–10.6.

Part III: Unconstrained Optimization • Chapter 11: Basics of Unconstrained Optimization. We recommend reading all of this chapter (with the exception of the proofs). If desired, either Section 11.5 or Section 11.6 could be omitted, but not both. Chapters 12 and 13 could be omitted. Chapter 13 makes more sense if taught after Chapter 12, but in fact, only Section 13.5 makes explicit use of the material in Chapter 12. • Chapter 12: Methods for Unconstrained Optimization. Sections 12.1–12.3 are the most important. All the remaining sections and subsections can be taught independently of each other. • Chapter 13: Low-Storage Methods for Unconstrained Problems. Once Sections 13.1 and 13.2 have been taught, the remaining sections are independent of each other. Part IV: Nonlinear Optimization • Chapter 14: Optimality Conditions for Constrained Problems. We recommend reading Sections 14.1–14.6. The rest of the chapter may be omitted. Within Section 14.8, Sections 14.8.3 and 14.8.5 can be taught without teaching the remaining subsections, although Section 14.8.5 depends on Section 14.8.3. (The discussion of nonlinear duality in Section 14.8 is only needed in Sections 16.6–16.8 of Chapter 16.) • Chapter 15: Feasible-Point Methods. We recommend reading Sections 15.1–15.4 (although Section 15.4.1 could be omitted). These sections explain how to solve problems with linear constraints. Sections 15.5–15.7 discuss methods for problems

i

i i

i

i

i

i

Preface

book 2008/10/23 page xvii i

xvii

with nonlinear constraints. Sections 15.5 and 15.6 are independent of each other, but Section 15.7 depends on Section 15.5. • Chapter 16: Penalty and Barrier Methods. We recommend reading Sections 16.1 and 16.2 (although Section 16.2.3 could be omitted). If more of the chapter is covered, then Section 16.3 should be read. Sections 16.4–16.8 are independent of each other. Sections 16.6–16.8 use Section 14.8.3 of Chapter 14.

Changes in the Second Edition The overall structure of the book has not changed in the new addition, and the major topic areas are the same. However, we have updated certain topics to reflect developments since the first edition appeared. We list the major changes here. Chapter 1 has been expanded to include examples of more realistic optimization models (Section 1.6). The description of interior-point methods for linear programming has been thoroughly revised and restructured (Chapter 10). The discussion of derivative-free methods has been extensively revised to reflect advances in theory and algorithms (Section 12.5). In Part IV we have added material on filter methods (Section 15.7), nonlinear primaldual methods (Section 16.7), and semidefinite programming (Section 16.8). In addition, numerous smaller changes have been made throughout the book. Some material from the first edition has been omitted here. The most notable examples are the chapter on nonlinear least-squares data fitting, and the sections on interior-point methods for convex programming. These topics from the first edition are available at the book Web site (see above for the URL). Sample Course Outlines We provide below some sample outlines for courses that might use this book. If a section is listed without mention of subsections, then it is assumed that all the subsections will be taught. If a subsection is specified, then the unmentioned subsections may be omitted. Proposed Course Outline: Linear Programming I: Foundations Chapter 1. Optimization Models 1. Introduction 3. Linear Equations 4. Linear Optimization 7. Optimization Applications 1. Crew Scheduling and Fleet Scheduling Chapter 2. Fundamentals of Optimization 1. Introduction 2. Feasibility and Optimality 3. Convexity 4. The General Optimization Algorithm

i

i i

i

i

i

i

xviii

book 2008/10/23 page xviii i

Preface

Chapter 3. Representation of Linear Constraints 1. Basic Concepts 2. Null and Range Spaces 3. Generating Null-Space Matrices 1. Variable Reduction Method II: Linear Programming Chapter 4. Geometry of Linear Programming 1. Introduction 2. Standard Form 3. Basic Solutions and Extreme Points 4. Representation of Solutions; Optimality Chapter 5. The Simplex Method 1. Introduction 2. The Simplex Method 3. The Simplex Method (Details) 4. Getting Started—Artificial Variables 1. The Two-Phase Method 5. Degeneracy and Termination Chapter 6. Duality and Sensitivity 1. The Dual Problem 2. Duality Theory 3. The Dual Simplex Method 4. Sensitivity Chapter 7. Enhancements of the Simplex Method 1. Introduction 2. Problems with Upper Bounds 3. Column Generation 5. Representation of the Basis Chapter 9. Computational Complexity of Linear Programming 1. Introduction 2. Computational Complexity 3. Worst-Case Behavior of the Simplex Method 4. The Ellipsoid Method 5. The Average-Case Behavior of the Simplex Method Chapter 10. Interior-Point Methods for Linear Programming 1. Introduction 2. The Primal-Dual Interior-Point Method Proposed Course Outline: Nonlinear Optimization I: Foundations Chapter 1. Optimization Models 1. Introduction

i

i i

i

i

i

i

Preface

book 2008/10/23 page xix i

xix

3. Linear Equations 5. Least-Squares Data Fitting 6. Nonlinear Optimization 7. Optimization Applications2 2. Support Vector Machines 3. Portfolio Optimization 4. Intensity Modulated Radiation Treatment Planning 5. Positron Emission Tomography Image Reconstruction 6. Shape Optimization Chapter 2. Fundamentals of Optimization 1. Introduction 2. Feasibility and Optimality 3. Convexity 4. The General Optimization Algorithm 5. Rates of Convergence 6. Taylor Series 7. Newton’s Method for Nonlinear Equations Chapter 3. Representation of Linear Constraints3 1. Basic Concepts 2. Null and Range Spaces 3. Generating Null-Space Matrices 1. Variable Reduction Method III: Unconstrained Optimization Chapter 11. Basics of Unconstrained Optimization 1. Introduction 2. Optimality Conditions 3. Newton’s Method for Minimization 4. Guaranteeing Descent 5. Guaranteeing Convergence: Line Search Methods 6. Guaranteeing Convergence: Trust-Region Methods Chapter 12. Methods for Unconstrained Optimization 1. Introduction 2. Steepest-Descent Method 3. Quasi-Newton Methods Chapter 13. Low-Storage Methods for Unconstrained Problems 1. Introduction 2. The Conjugate-Gradient Method for Solving Linear Equations 3. Truncated-Newton Methods 4. Nonlinear Conjugate-Gradient Methods 5. Limited-Memory Quasi-Newton Methods 2 Not 3 The

all the applications need be taught. material in Chapter 3 is not needed until Part IV.

i

i i

i

i

i

i

xx

book 2008/10/23 page xx i

Preface

IV: Nonlinear Optimization Chapter 14. Optimality Conditions for Constrained Problems 1. Introduction 2. Optimality Conditions for Linear Equality Constraints 3. The Lagrange Multipliers and the Lagrangian Function 4. Optimality Conditions for Linear Inequality Constraints 5. Optimality Conditions for Nonlinear Constraints 6. Preview of Methods 8. Duality 3. Wolfe Duality 5. Duality in Support Vector Machines Chapter 15. Feasible-Point Methods 1. Introduction 2. Linear Equality Constraints 3. Computing the Lagrange Multipliers 4. Linear Inequality Constraints 5. Sequential Quadratic Programming Chapter 16. Penalty and Barrier Methods 1. Introduction 2. Classical Penalty and Barrier Methods Proposed Course Outline: Introduction to Optimization I: Foundations Chapter 1. Optimization Models 1. Introduction 3. Linear Equations 4. Linear Optimization 5. Least-Squares Data Fitting 6. Nonlinear Optimization 7. Optimization Applications4 Chapter 2. Fundamentals of Optimization 1. Introduction 2. Feasibility and Optimality 3. Convexity 4. The General Optimization Algorithm 5. Rates of Convergence 6. Taylor Series 7. Newton’s Method for Nonlinear Equations Chapter 3. Representation of Linear Constraints 1. Basic Concepts 2. Null and Range Spaces 4 Not

all the applications need be taught.

i

i i

i

i

i

i

Preface

book 2008/10/23 page xxi i

xxi

3. Generating Null-Space Matrices 1. Variable Reduction Method II: Linear Programming Chapter 4. Geometry of Linear Programming 1. Introduction 2. Standard Form 3. Basic Solutions and Extreme Points 4. Representation of Solutions; Optimality Chapter 5. The Simplex Method 1. Introduction 2. The Simplex Method 3. The Simplex Method (Details) 4. Getting Started—Artificial Variables 1. The Two-Phase Method 5. Degeneracy and Termination Chapter 6. Duality and Sensitivity 1. The Dual Problem 2. Duality Theory 4. Sensitivity Chapter 8. Network Problems 1. Introduction 2. Basic Concepts and Examples III: Unconstrained Optimization Chapter 11. Basics of Unconstrained Optimization 1. Introduction 2. Optimality Conditions 3. Newton’s Method for Minimization 4. Guaranteeing Descent 5. Guaranteeing Convergence: Line Search Methods IV: Nonlinear Optimization Chapter 14. Optimality Conditions for Constrained Problems 1. Introduction 2. Optimality Conditions for Linear Equality Constraints 3. The Lagrange Multipliers and the Lagrangian Function 4. Optimality Conditions for Linear Inequality Constraints 5. Optimality Conditions for Nonlinear Constraints 6. Preview of Methods

i

i i

i

i

i

i

xxii

book 2008/10/23 page xxii i

Preface

Acknowledgments We owe a great deal of thanks to the people who have assisted us in preparing this second edition of this book. In particular, we would like to thank the following individuals for reviewing various portions of the manuscript and providing helpful advice and guidance: ErlingAndersen, Bob Bixby, Sanjay Mehrotra, Hans Mittelmann, Michael Overton, Virginia Torczon, and Bob Vanderbei. We are especially grateful to Sara Murphy at SIAM for guiding us through the preparation of the manuscript. Special thanks also to Galina Spivak, whose design for the front cover skillfully conveys, in our minds, the spirit of the book. We continue to be grateful to those individuals who contributed to the preparation of the first edition. These include: Kurt Anstreicher, John Anzalone, Todd Beltracchi, Dimitri Bertsekas, Bob Bixby, Paul Boggs, Dennis Bricker, Tony Chan, Jessie Cohen, Andrew Conn, Blaine Crowthers, John Dennis, Peter Foellbach, John Forrest, Bob Fourer, Christoph Luitpold Frommel, Saul Gass, David Gay, James Ho, Sharon Holland, Jeffrey Horn, Soonam Kahng, Przemyslaw Kowalik, Michael Lewis, Lorin Lund, Irvin Lustig, Maureen Mackin, Eric Munson, Arkadii Nemirovsky, Florian Potra, Michael Rothkopf, Michael Saunders, David Shanno, Eric Smith, Martin Smith, Pete Stewart, André Tits, Michael Todd, Virginia Torczon, Luis Vicente, Don Wagner, Bing Wang, and Tjalling Ypma. While preparing the first edition, we received valuable support from the National Science Foundation. We also benefited from the facilities of the National Institute of Standards and Technology and Rice University. Igor Griva Stephen G. Nash Ariela Sofer

i

i i

i

i

i

i

book 2008/10/23 page 1 i

Part I

Basics

i

i i

i

i

book 2008/10/23 page 2 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 3 i

Chapter 1

Optimization Models

1.1

Introduction

Optimization models attempt to express, in mathematical terms, the goal of solving a problem in the “best” way. That might mean running a business to maximize profit, minimize loss, maximize efficiency, or minimize risk. It might mean designing a bridge to minimize weight or maximize strength. It might mean selecting a flight plan for an aircraft to minimize time or fuel use. The desire to solve a problem in an optimal way is so common that optimization models arise in almost every area of application. They have even been used to explain the laws of nature, as in Fermat’s derivation of the law of refraction for light. Optimization models have been used for centuries, since their purpose is so appealing. In recent times they have come to be essential, as businesses become larger and more complicated, and as engineering designs become more ambitious. In many circumstances it is no longer possible, or economically feasible, for decisions to be made without the aid of such models. In a large, multinational corporation, for example, a minor percentage improvement in operations might lead to a multimillion dollar increase in profit, but achieving this improvement might require analyzing all divisions of the corporation, a gargantuan task. Likewise, it would be virtually impossible to design a new computer chip involving millions of transistors without the aid of such models. Such large models, with all the complexity and subtlety that they can represent, would be of little value if they could not be solved. The last few decades have witnessed astonishing improvements in computer hardware and software, and these advances have made optimization models a practical tool in business, science, and engineering. It is now possible to solve problems with thousands or even millions of variables. The theory and algorithms that make this possible form a large portion of this book. In the first part of this chapter we give some simple examples of optimization models. They are grouped in categories, where the divisions reflect the properties of the models as well as the differences in the techniques used to solve them. We include also a discussion of systems of linear equations, which are not normally considered to be optimization models. However, linear equations are often included as constraints in optimization models, and their solution is an important step in the solution of many optimization problems. 3

i

i i

i

i

i

i

4

book 2008/10/23 page 4 i

Chapter 1. Optimization Models

x2 3−

2−

1−

x

| 1

| 2

| 3

x1

Figure 1.1. Nonlinear optimization problem. The feasible set is the dark line. In the last section of this chapter we give some examples of applications of optimization. These examples reflect families of problems that are either in wide use, or—at the time of writing of this edition of the book—are subject of intense research. The examples reflect the tastes of the authors; by no means do they constitute a broad or representative sample of the myriad applications where optimization is in use today.

1.2

Optimization: An Informal Introduction

Consider the problem of finding the point on the line x1 + x2 = 2 that is closest to the point (2, 2)T (see Figure 1.1) . The problem can be written as minimize subject to

f (x) = (x1 − 2)2 + (x2 − 2)2 x1 + x2 = 2.

It is easy, of course, to see that the problem has an optimum at x = (1, 1)T. This problem is an example of an optimization problem. Optimization problems typically minimize or maximize a function f (called the objective function) in a set of points S (called the feasible set). Commonly, the feasible set is defined by some constraints on the variables. In this example our objective function is the nonlinear function f (x) = (x1 −2)2 +(x2 −2)2 , and the feasible set S is defined by a single linear constraint x1 +x2 = 2. The feasible set could also be defined by multiple constraints. An example is the problem minimize subject to

f (x) = x1 x12 ≤ x2 x12 + x22 ≤ 2.

The feasible set S for this problem is shown in Figure 1.2; it is easy to see that the optimal point is x = (−1, 1)T. It is possible to have an unconstrained optimization problem where

i

i i

i

i

i

i

1.2. Optimization: An Informal Introduction

book 2008/10/23 page 5 i

5

x2 −

x

| −2

1−

| −1

0

| 1

x1

−1 −

−2 −

Figure 1.2. Nonlinear optimization problem with inequality constraints. there are no constraints, as in the example minimize f (x) = (ex1 − 1)2 + (x2 − 1)2 . The feasible set S here is the entire two-dimensional space. The minimizer is x = (0, 1)T, since the function value is zero at this point and positive elsewhere. We see from these examples that the feasible set can be defined by equality constraints or inequality constraints or no constraints at all. The functions defining the objective function and the constraints may be linear or nonlinear. The examples above are nonlinear optimization problems since at least some of the functions involved are nonlinear. If the objective function and the constraints are all linear, the problem is a linear optimization problem or linear program. An example is the problem maximize subject to

f (x) = 2x1 + x2 x1 + x2 ≤ 1 x1 ≥ 0, x2 ≥ 0.

Figure 1.3 shows the feasible set. The optimal solution is clearly x = (1, 0)T. Consider now the nonlinear optimization problem maximize subject to

f (x) = (x1 + x2 )2 x1 x2 ≥ 0 −2 ≤ x1 ≤ 1 −2 ≤ x2 ≤ 1.

The feasible set is shown in Figure 1.4. The point xc = (1, 1)T has an objective value of f (xc ) = 4, which is a higher objective value than any of its “nearby” feasible points. It is therefore called a local optimizer. In contrast the point x = (−2, −2)T has an objective value f (x ) = 16 which is the best among all feasible points. It is called a global optimizer.

i

i i

i

i

i

i

6

book 2008/10/23 page 6 i

Chapter 1. Optimization Models

x2 2−

1

x 0

| 2

1

x1

−1 −

Figure 1.3. Linear optimization problem. The feasible region is shaded.

x2 2−

xc 1

−2

| −1

0

1

| 2

x1

−1 −

x

−2

Figure 1.4. Local and global solutions. The feasible region is shaded. The methods we consider in this book focus on finding local optima. We will usually assume that the problem functions and their first and second derivatives are continuous. We can then use derivative information at a given point to anticipate the behavior of the problem functions at “nearby” points and use this to determine whether the point is a local solution and if not, to find a better point. The derivative information cannot usually anticipate the behavior of the functions at points “farther away,” and hence cannot determine whether a local solution is also the global solution. One exception is when the problem solved is a convex optimization problem, in which any local optimizer is also a global optimizer (see Section 2.3). Luckily, linear programs are convex so that for this important family of problems, local solutions are also global.

i

i i

i

i

i

i

1.3. Linear Equations

book 2008/10/23 page 7 i

7

It may seem odd to give so much attention to finding local optimizers when they are not always guaranteed to be global optimizers. However, most global optimization algorithms seek the global optimum by finding local solutions to a sequence of subproblems generated by some methodical approximation to the original problem; the techniques described in the book are suitable for these subproblems. In addition, for some applications a local solution may be sufficient, or the user might be satisfied with an improvement on the objective value. Of course, some applications require finding a global solution. The drawback is that for a problem that is not convex (or not known to be convex), finding a global solution can require substantially more computational effort than finding a local solution. Our book will also assume that the variables of the problems are continuous, that is, they can take a continuous range of real values. For this reason the problems we consider are also referred to as continuous optimization problems. Many variables such as length, volume, weight, and time are by nature continuous, and even though we cannot compute or measure them to infinite precision, it is plausible in the optimization to assume that they are continuous. On the other hand, variables such as the number of people to be hired, the number of flights to dispatch per day, or the number of new plants to be opened can assume only integer values. Problems where the variables can only take on integer values are called discrete optimization problems or, in the case where all problem functions are linear, integer programming problems. In a few applications it is sufficient to solve the problem ignoring the integrality restriction, and once a solution is obtained, to round off the variables to their nearest integer. Unfortunately rounding off of a solution does not guarantee that it is optimal, or even that it is feasible, so this approach is often inadequate. While a discussion of discrete optimization is beyond the scope of this book, we will mention that such problems are much harder than their continuous counterparts for much the same reason global optimization is harder than local optimization. Since at a given point we only have information of the behavior of the function at “nearby points,” there are no straightforward conditions that can determine whether a given feasible solution is optimal. Hence the solution process must rule out either explicitly or implicitly every other feasible solution. Thus the search for an integer solution requires the solution of a potentially large sequence of continuous optimization subproblems. Typically the first of these subproblems is a relaxed problem, in which the integrality requirement on each variable is relaxed (omitted) and replaced by a (continuous) constraint on the range of the variable. If, for example, a variable xj is restricted to be either 0, 1, or 2, the relaxed constraint would be 0 ≤ xj ≤ 2. Subsequent subproblems would typically include additional continuous constraints. The subproblems would be solved by continuous optimization methods such as those described in the book. Continuous optimization is the basis for the solution of many applied problems, both discrete and continuous, convex or nonconvex. The examples in this chapter reflect just a small fraction of such applications.

1.3

Linear Equations

Systems of linear equations are central to almost all optimization algorithms and form a part of a great many optimization models. They are used in this section to represent a datafitting example. A slight generalization of this example will lead to the important problem of least-squares data fitting. Linear equations are also used to represent constraints in a model.

i

i i

i

i

i

i

8

book 2008/10/23 page 8 i

Chapter 1. Optimization Models

Finally, solving systems of linear equations is an important step in the simplex method for linear programming and Newton’s method for nonlinear optimization, and is a technique used to determine dual variables (Lagrange multipliers) in both settings. In this chapter we only give examples of linear equations. Techniques for their solution are discussed in Appendix A. Our example is based on Figure 1.5. The points marked by • are assumed to lie on the graph of a quadratic function. These points, denoted by (ti , bi )T, have the coordinates (2, 1)T, (3, 6)T, and (5, 4)T. The quadratic function can be written as b(t) = x1 + x2 t + x3 t 2 , where x1 , x2 , and x3 are three unknown parameters that determine the quadratic. The three data points define three equations of the form b(ti ) = bi : x1 + x2 (2) + x3 (2)2 = 1 x1 + x2 (3) + x3 (3)2 = 6 x1 + x2 (5) + x3 (5)2 = 4 or x1 + 2x2 + 4x3 = 1 x1 + 3x2 + 9x3 = 6 x1 + 5x2 + 25x3 = 4. The solution is (x1 , x2 , x3 )T = (−21, 15, −2)T, or b(t) = −21 + 15t − 2t 2 , and is graphed in Figure 1.5. This approach to data fitting has many applications. It is not unique to fitting data by a quadratic function. If the data were thought to have some sort of periodic component (perhaps a daily fluctuation), then a more appropriate model might be b(t) = x1 + x2 t + x3 sin t, and the system of equations would have the form x1 + x2 (2) + x3 (sin 2) = 1 x1 + x2 (3) + x3 (sin 3) = 6 x1 + x2 (5) + x3 (sin 5) = 4. Also, there is nothing special about having three data points and three terms in the model. If we wish to associate the data-fitting problem with a system of linear equations, then the number of data points and the number of model terms must be the same. However, through the use of least-squares models (see Section 1.5), it would be possible to have more data points than model terms. In fact, this is often the case. Least-squares techniques are also appropriate if there are measurement errors in the data (also a common occurrence).

i

i i

i

i

i

i

1.3. Linear Equations

book 2008/10/23 page 9 i

9

10

8

6

4

b

2

0

–2

–4

–6

–8

–10

0

1

2

3

4

5

6

7

t

Figure 1.5. Fitting a quadratic function to data. Let us return to the example of the quadratic model. We can write the system of equations in matrix form as 

or more generally,



1 1 1

2 3 5

4 9 25

1

t1

t12

t2 t3

t22 t32

⎝1 1



⎞ ⎠

x1 x2 x3

x1 x2 x3



  1 = 6 , 4



 =

b1 b2 b3

 .

If there were n data points and the model were of the form b(t) = x1 + x2 t + · · · + xn t n−1 , then the system would have the form ⎛1 ⎜1 ⎜ ⎝ 1

t1 t2 tn

· · · t1n−1 ⎞ ⎛ x1 ⎞ ⎛ b1 ⎞ · · · t2n−1 ⎟ ⎜ x2 ⎟ ⎜ b2 ⎟ ⎟⎜ . ⎟ = ⎜ . ⎟. .. ⎠ ⎝ .. ⎠ ⎝ .. ⎠ . · · · tnn−1

xn

bn

We will often denote such a system of linear equations as Ax = b. For these examples the number of data points is equal to the number of variables. Equivalently the matrix A has the same number of rows and columns. We refer to this as a “square” system because of the shape of the matrix A. It is also possible to consider problems with unequal numbers of data points and variables. Such examples, called “rectangular,” are discussed in Section 1.5.

i

i i

i

i

i

i

10

book 2008/10/23 page 10 i

Chapter 1. Optimization Models

Table 1.1. Cabinet data. Cabinet Bookshelf With Doors With Drawers Custom

1.4

Wood 10 12 25 20

Labor 2 4 8 12

Revenue 100 150 200 400

Linear Optimization

A linear optimization model (also knows as a “linear program”) involves the optimization of a linear function subject to linear constraints on the variables. Although linear functions are simple functions, they arise frequently in economics, production planning, networks, scheduling, and other applications. We will consider several examples. Further examples are included in Section 1.7 and in Chapters 5–8. In particular, examples of network models are discussed in Section 8.2. Suppose that a manufacturer of kitchen cabinets is trying to maximize the weekly revenue of a factory. Various orders have come in that the company could accept. They include bookcases with open shelves, cabinets with doors, cabinets with drawers, and customdesigned cabinets. Table 1.1 indicates the quantities of materials and labor required to assemble the four types of cabinets, as well as the revenue earned. Suppose that 5000 units of wood and 1500 units of labor are available. Let x1 , . . . , x4 represent the number of cabinets of each type made (x1 for bookshelves, x2 for cabinets with doors, etc.). Then the corresponding linear programming model might be maximize

z = 100x1 + 150x2 + 200x3 + 400x4

subject to

10x1 + 12x2 + 25x3 + 20x4 ≤ 5000 2x1 + 4x2 + 8x3 + 12x4 ≤ 1500 x1 , x2 , x3 , x4 ≥ 0.

This problem can easily be expanded from four products (bookshelves, cabinets with doors, cabinets without doors, etc.) to any number of products n, and from two resources (wood and labor) to any number of resources m. Denoting the unit profit from product j by cj , the amount available of resource i by bi , and the amount of resource i used by a unit of product j by aij , the problem can be written in the form maximize subject to

z= n

j =1

n

cj xj

j =1

aij ≤ bi ,

xj ≥ 0,

i = 1, . . . , m j = 1, . . . , n.

The problem can be written in a more compact manner by introducing matrix-vector notation. Letting x = (x1 , . . . , xn )T, c = (c1 , . . . , cn )T, b = (b1 , . . . , bm )T, and denoting the matrix

i

i i

i

i

i

i

1.4. Linear Optimization

book 2008/10/23 page 11 i

11

Table 1.2. Work times (in minutes). Worker

Information

Policy

Claim

1 2 3 4 5

10 15 13 19 17

28 22 18 25 23

31 42 35 29 33

of coefficients aij by A, the problem becomes maximize subject to

z = cTx Ax ≤ b x ≥ 0.

This is a typical example of a linear program. Here a linear objective function is to be maximized subject to linear inequality constraints and nonnegativity constraints on the variables. In the general case, the objective of a linear program may be either maximized or minimized, the constraints may involve a combination of inequalities and equalities, and the variables may be either restricted in sign or unrestricted. Although these may appear as different forms, it is easy to convert from one form to another. As another example, consider the assignment of jobs to workers. Suppose that an insurance office handles three types of work: requests for information, new policies, and claims. There are five workers. Based on a study of office operations, the average work times (in minutes) for the workers are known; see Table 1.2. The company would like to minimize the overall elapsed time for handling a (long) sequence of tasks, by appropriately assigning a fraction of each type of task to each worker. Let pi be the fraction of information calls assigned to worker i, qi the fraction of new policy calls, and ri the fraction of claims; t will represent the elapsed time. Then a linear programming model for this situation would be minimize subject to

z=t p1 + p2 + p3 + p4 + p5 = 1 q1 + q2 + q3 + q4 + q5 = 1 r1 + r2 + r3 + r4 + r5 = 1 10p1 + 28q1 + 31r1 ≤ t 15p2 + 22q2 + 42r2 ≤ t 13p3 + 18q3 + 35r3 ≤ t 19p4 + 25q4 + 29r4 ≤ t 17p5 + 23q5 + 33r5 ≤ t pi , qi , ri ≥ 0, i = 1, . . . , 5.

The constraints in this model assure that t is no less than the overall elapsed time. Since the objective is to minimize t, at the optimal solution t will be equal to the elapsed time.

i

i i

i

i

i

i

12

book 2008/10/23 page 12 i

Chapter 1. Optimization Models

The problems we have introduced so far are small, involving only a handful of variables and constraints. Many real-life applications involve much larger problems, with possibly hundreds of thousands of variables and constraints. Section 1.7 discusses some of these applications.

Exercise5 4.1. Consider the production scheduling problem of the perfume Polly named after a famous celebrity. The manufacturer of the perfume must plan production for the first four months of the year and anticipates a demand of 4000, 5000, 6000, and 4500 gallons in January, February, March, and April, respectively. At the beginning of the year the company has an inventory of 2000 gallons. The company is planning on issuing a new and improved perfume called Pollygone in May, so that all Polly produced must be sold by the end of April. Assume that the production cost for January and February is $5 per gallon and this will rise to $5.5 per gallon in March and April. The company can hold any amount produced in a certain month over to the next month at an inventory cost of $1 per unit. Formulate a linear optimization model that will minimize the costs incurred in meeting the demand for Polly in the period January through April. Assume for simplicity that any amount produced in a given month may be used to fulfill demand for that month.

1.5

Least-Squares Data Fitting

Let us re-examine the quadratic model from Section 1.3: b(t) = x1 + x2 t + x3 t 2 . For the data points (2, 1), (3, 6), and (5, 4) we obtained the linear system      1 2 4 x1 1 1 3 9 x2 = 6 1 5 25 4 x3 with solution x = (−21, 15, −2)T so that b(t) = −21 + 15t − 2t 2 . It is easy to check that the three data points satisfy this equation. Suppose that the data points had been obtained from an experiment, with an observation made at times t1 = 2, t2 = 3, and t3 = 5. If another observation were made at t4 = 7, then (assuming that the quadratic model is correct) it should satisfy b(7) = −21 + 15 × 7 − 2 × 72 = −14. If the observed value at t4 = 7 were not equal to −14, then the observation would not be consistent with the model. 5 See

Footnote 1 in the Preface for an explanation of the Exercise numbering within chapters.

i

i i

i

i

i

i

1.5. Least-Squares Data Fitting

book 2008/10/23 page 13 i

13

It is common when collecting data to gather more data points than there are variables in the model. This is true in political polls where hundreds or thousands of people will be asked which candidate they plan to vote for (so that there is only one variable). It is also true in scientific experiments where repeated measurements will be made of a desired quantity. It is expected that each of the measurements will be in error, and that the observations will be used collectively in the hope of obtaining a better result than any individual measurement provides. (The collective result may only be better in the sense that the bound on its error will be smaller. Since the true value is often unknown, the actual errors cannot be measured.) Since each of the measurements is considered to be in error, it is no longer sensible to ask that the model equation (in our case b(t) = x1 + x2 t + x3 t 2 ) be solved exactly. Instead we will try to make components of the “residual vector” ⎛ ⎞ b1 − (x1 + x2 t1 + x3 t12 ) ⎜ b − (x + x t + x t 2 ) ⎟ 1 2 2 3 2 ⎟ ⎜ 2 r = b − Ax = ⎜ ⎟ .. ⎝ ⎠ . bm − (x1 + x2 tm + x3 tm2 ) small in some sense. The most commonly used approach is called “least squares” data fitting, where we try to minimize the sum of the squares of the components of r: minimize r12 + · · · + rm2 = x

m

[bi − (x1 + x2 ti + x3 ti2 )]2 .

i=1

Under appropriate assumptions about the errors in the observations, it can be shown that this is an optimal way of selecting the coefficients x. If the fourth data point was (7, −14)T, then the least-squares approach would give x = (−21, 15, −2)T, since this choice of x would make r = 0. In this case the graph of the model would pass through all four data points. However, if the fourth data point was (7, −15)T, then the least-squares solution would be  x=

−21.9422 15.6193 −2.0892

 .

The corresponding residual vector would be ⎛

⎞ 0.0603 ⎜ −0.1131 ⎟ r = b − Ax = ⎝ ⎠. 0.0754 −0.0226 None of the residuals is zero, and so the graph of the model does not pass through any of the data points. This is typical in least-squares models. If the residuals can be written as r = b − Ax, then the model is “linear.” This name is used because each of the coefficients xj occurs linearly in the model. It does not mean that the model terms are linear in t. In fact, the model above has a quadratic term x3 t 2 . Other

i

i i

i

i

i

i

14

book 2008/10/23 page 14 i

Chapter 1. Optimization Models

examples of linear models would be b(t) = x1 + x2 sin t + x3 sin 2t + · · · + xk+1 sin kt x2 b(t) = x1 + . 1 + t2 “Nonlinear” models are also possible. Some examples are b(t) = x1 + x2 ex3 t + x4 ex5 t x2 b(t) = x1 + . 1 + x3 t 2 In these models there are nonlinear relationships among the coefficients xj . A nonlinear least-squares model can be written in the form minimize f (x) =

m

ri (x)2 ,

i=1

where ri (x) represents the residual at ti . For example, ri (x) ≡ bi − (x1 + x2 ex3 ti + x4 ex5 ti ) for the first nonlinear model above. We can also write this as f (x) = r(x)Tr(x). If the model is linear, then r(x) = b − Ax and f (x) can be shown to be a quadratic function. See the Exercises. Nonlinear least squares models are examples of unconstrained minimization problems, that is, they correspond to the minimization of a nonlinear function without constraints on the variables. In fact, they are one of the most commonly encountered unconstrained minimization problems.

Exercises 5.1. Prove that for the linear least-squares problem with r(x) = b − Ax, the objective f (x) = r(x)Tr(x) is a quadratic function.

1.6

Nonlinear Optimization

A nonlinear optimization model (also referred to as a “nonlinear program”) consists of the optimization of a function subject to constraints, where any of the functions may be nonlinear. This is the most general type of model that we will consider in this book. It includes all the other types of models as special cases. Nonlinear optimization models arise often in science and engineering. For example, the volume of a sphere is a nonlinear function of its radius, the energy dissipated in an electric

i

i i

i

i

i

i

1.6. Nonlinear Optimization

book 2008/10/23 page 15 i

15

6 ( x2 , y2 ) 4 w2

( x1 , y1 ) w1

(x , y ) 0

2 w3 ( x3 , y3 )

0

w4 ( x4 , y4 ) 5

10

-2

-4

Figure 1.6. Electrical connections. circuit is a nonlinear function of the resistances, the size of an animal population is a nonlinear function of the birth and death rates, etc. We will develop two specific examples here. Suppose that four buildings are to be connected by electrical wires. The positions of the buildings are illustrated in Figure 1.6. The first two buildings are circular: one at (1, 4)T with radius 2, the second at (9, 5)T with radius 1. The third building is square with sides of length 2 centered at (3, −2)T. The fourth building is rectangular with height 4 and width 2 centered at (7, 0)T. The electrical wires will be joined at some central point (x0 , y0 )T and will connect to building i at position (xi , yi )T. The objective is to minimize the amount of wire used. Let wi be the length of the wire connecting building i to (x0 , y0 )T. A model for this problem is minimize subject to

z = w1 + w2 + w3 + w4 wi = (xi − x0 )2 + (yi − y0 )2 , i = 1, 2, 3, 4, (x1 − 1)2 + (y1 − 4)2 ≤ 4 (x2 − 9)2 + (y2 − 5)2 ≤ 1 2 ≤ x3 ≤ 4 −3 ≤ y3 ≤ −1 6 ≤ x4 ≤ 8 −2 ≤ y4 ≤ 2.

We assume here for simplicity that the wires can be routed through the buildings (if necessary) at no additional cost. The constraints in nonlinear optimization problems are often written so that the righthand sides are equal to zero. For the above model this would correspond to using constraints of the form wi − (xi − x0 )2 + (yi − y0 )2 = 0, i = 1, 2, 3, 4, and so forth. This is just a cosmetic change to the model.

i

i i

i

i

i

i

16

book 2008/10/23 page 16 i

Chapter 1. Optimization Models

h

r

Figure 1.7. Archimedes’ problem.

2 1

4

3 Figure 1.8. Traffic network. As a second example we consider a problem posed by Archimedes. Figure 1.7 illustrates a portion of a sphere with radius r, where the height of the spherical segment is h. The problem is to choose r and h so as to maximize the volume of the segment, but where the surface area A of the segment is fixed. The model is maximize subject to

v(r, h) = π h2 (r − h3 ) 2π rh = A.

Archimedes was able to prove that the solution was a hemisphere (i.e., h = r). As another illustration of how nonlinear models can arise, consider the network in Figure 1.8. This represents a set of road intersections, and the arrows indicate the direction of traffic. If few cars are on the roads, the travel times between intersections can be considered as constants, but if the traffic is heavy, the travel times can increase dramatically. Let us focus on the travel time between a pair of intersections i and j . Let ti,j be the (constant) travel time when the traffic is light, let xi,j be the number of cars entering the road per hour, let ci,j be the capacity of the road, that is, the maximum number of cars entering per hour, and let αi,j be a constant reflecting the rate at which travel time increases as the traffic get heavier. (The constant αi,j might be selected using data collected about the road system.)

i

i i

i

i

i

i

1.6. Nonlinear Optimization

book 2008/10/23 page 17 i

17

Then the travel time between intersections i and j could be modeled by Ti,j (xi,j ) = ti,j + αi,j

xi,j . 1 − xi,j /ci,j

If there is no traffic on the road (xi,j = 0), then the travel time is ti,j . If xi,j approaches the capacity of the road ci,j , then the travel time tends to +∞. Ti,j is a nonlinear function of xi,j . Suppose we wished to minimize the total travel time through the network for a volume of X cars per hour. Then our model would be minimize f (x) =



xi,j Ti,j (xi,j )

subject to the constraints x1,2 + x1,3 = X x2,3 + x2,4 − x1,2 = 0 x3,4 − x1,3 − x2,3 = 0 x2,4 + x3,4 = X 0 ≤ xi,j ≤ cij . The equations ensure that all cars entering an intersection also leave an intersection. The objective sums up the travel times for all the cars. A potential snag with this formulation is that if the traffic volume reaches capacity on any arc (xi,j = ci,j ), the objective function becomes undefined, which will cause optimization software to fail. A number of measures could be invoked to prevent this situation. One alternative is to slightly lower the upper bounds on the variables, so that xi,j ≤ ci,j − , where  is a small positive number. Alternatively we could increase each denominator in the objective by a small positive amount , thus forcing the denominator to have a value of at least  and thereby avoiding division by zero. Our last example is the problem of finding the minimum distance from a point r to the set {x : a Tx = b}. In two dimensions the points in the set S define a line, and in three dimensions they define a plane; in the more general case, the set is called a hyperplane. The least-distance problem can be written as minimize subject to

f (x) = 12 (x − r)T(x − r) a Tx = b.

(The coefficient of one half in the objective is included for convenience; it allows for simpler formulas when analyzing the problem.) Unlike most nonlinear problems this one has a closed-form solution. It is given by x=r+

b − a Tr a. a Ta

(See the Exercises for Section 14.2.)

i

i i

i

i

i

i

18

book 2008/10/23 page 18 i

Chapter 1. Optimization Models

The minimum distance problem is an example of a quadratic program. In general, a quadratic program involves the minimization of a quadratic function subject to linear constraints. An example is the problem minimize subject to

f (x) = 12 x TQx Ax ≥ b.

Quadratic programs for which the matrix Q is positive definite are relatively easy to solve, compared to other nonlinear problems.

1.7

Optimization Applications

In this section we present a number of applications that are of current interest to practitioners or researchers. The models we present are but a few of the numerous applications where optimization is making a significant impact. We start by presenting two problems arising in the optimization of airline operations— the crew scheduling and fleet scheduling problems. Both problems are large linear programs with the added restriction that the variables must take on integer values. Next we discuss an approach for pattern classification known as support vector machines. Given a set of points that all belong to one of two classes, the idea is to estimate a function that will automatically classify to which of the two classes a new point belongs. In particular we discuss the case where the classifying function is linear. The resulting problem is a quadratic program. This topic is developed further in Chapter 14. Also in this section we discuss a portfolio optimization problem that attempts to balance between the competing goals of maximizing expected returns and minimizing risk in investment planning. This too is a quadratic program. Next we will discuss two optimization problems arising from medical applications. One problem arises from planning for treatment of cancer by radiation, where the conflicting goals of providing sufficient radiation to the tumor and limiting the dosage to nearby vital organs give rise to a plethora of models which cover the spectrum from linear through quadratic to nonlinear. The other problem arises from positron emission tomography (PET) image reconstruction, where a model of the image that best fits the scan data gives rise to a linearly constrained nonlinear problem. In both applications the optimization problems can be very large and challenging to solve. Finally we use optimization to find the shape of a hanging cable with minimum potential energy. We present several models of the problem and emphasize the importance of certain modeling issues.

1.7.1

Crew Scheduling and Fleet Scheduling

Consider an airline that operates 2000 flights per day serving 100 cities worldwide, with 400 aircraft of 10 different types, each requiring a flight crew. The airline must design a flight schedule that meets the passenger demand, the maintenance requirements on aircraft, and all other safety regulations and labor contract rules, while trying to be cost effective in order to maximize profit.

i

i i

i

i

i

i

1.7. Optimization Applications

book 2008/10/23 page 19 i

19

This planning problem is extremely complex. For this reason many airlines used a phased planning cycle that breaks the problem into smaller steps. While more manageable, the individual steps themselves can also be complex. Arguably the most challenging of these is the crew scheduling problem, that assigns crews (pilots and flight attendants) to flights. Economically it is a significant problem, since the cost of crews is second only to the cost of fuel in an airline’s operating expenses. Saving even 1% of this cost can save the airline hundreds of millions of dollars annually. Computationally it is a difficult problem since it involves a linear model, which is not only very large, but also involves integer variables, which necessitates multiple solutions of linear programs. In planning the crew activities, the flight schedule is subdivided into “legs,” representing a nonstop flight from one city to another. If a plane flew from, say, New York via Chicago to Los Angeles, this would be considered as two legs. A large airline would typically have hundreds of flight legs per day. The planning period might be a day, a week, or a month. The crews themselves are certified for particular aircraft, and this restricts how personnel can be assigned to legs. In addition, there are union rules and federal laws that constrain the crew assignments. To set up the model, the airline first specifies a set of possible crew assignments. One of these assignments might correspond to sending a crew from New York (their home city) to a sequence of cities and then back to New York. Each such round trip is called a “pairing.” The number of pairings grows exponentially with the number of legs, and for a large airline, the number of pairings may easily run into the billions, even for the shorter planning period of one week. The variables in the model are xj , where xj is 1 if a particular pairing is selected as part of the total schedule, and 0 otherwise. Let the total number of pairings be N . The majority of the constraints correspond to the requirement that each leg in the planning period be covered by exactly one pairing. For the ith leg, the constraint has the form N

ai,j xj = 1,

j =1

where the constant ai,j = 1 if a particular pairing includes leg i, and zero otherwise. There is one such constraint for every leg in the schedule. The columns of the matrix A correspond to the pairings, and each pairing must represent a round trip that is technically and legally feasible. For example, if a crew flies from New York to Chicago, it cannot then immediately fly out of Denver. The pairing makes sense if it makes sense chronologically, includes minimum rests between flights, satisfies regulations on maximum flying time, and so forth. This places many restrictions on how the pairings are generated, and hence on the coefficients ai,j . The resulting columns of A are typically very sparse, with many zeros, and just a few ones, corresponding to the legs of the roundtrip. The cost cj of a pairing is a function of the duration of the pairing, the number of flight hours, and “penalties” that may be associated with the pairing. For example, extra wages and expenses must be paid if the crew spends a night away from its home city, or it may be necessary to transport a crew from one city to another for them to complete the pairing.

i

i i

i

i

i

i

20

book 2008/10/23 page 20 i

Chapter 1. Optimization Models The basic model has the form minimize subject to

z = cTx N

ai,j xj = 1 j =1

xj = 0 or 1. The problem is a linear program with the additional requirement that the variables take on integer values (here—zero and one), hence it is an integer programming problem. As mentioned in Section 1.2, such problems are most commonly solved by solving a sequence of linear programs, where the integrality restrictions are relaxed and replaced by a (continuous) constraint on the range of the variable. The range should ideally be as tight as possible, yet should not exclude the optimal solution. For a zero-one problem the relaxed constraints for the first subproblem would typically be 0 ≤ xj ≤ 1 for all j . Subsequent problems are variants of the relaxed problem, usually with additional constraints or an adjusted objective function. Crew scheduling problems can be very large. A major effort is required just to generate the possible pairings. Commonly, only a partial model is generated, corresponding to a subset of the possible pairings. Even so, problems with millions of variables are typical. Linear programs of this size (even ignoring the integrality restriction) are difficult to solve. They demand all the resources of the most sophisticated software. The special structure of the matrix A (and in particular its sparsity—the large number of zero entries) and the latest algorithmic techniques must be used. Many of these techniques are discussed in Part II. The crew scheduling problem is typically the last step in an airline’s schedule planning. The first step begins about several months prior to the actual service when the airline selects the optimal set of flight legs to be included in its schedule. The flight schedule lists the schedule of flight legs by departure time, destination, and arrival time. The next step is fleet assignment, which determines which type of aircraft will fly each leg of the schedule. Airline fleets are made up of many different types of aircraft, which differ in capacity and in operational characteristics such as speed, fuel burn rates, landing weights, range, and maintenance costs. Allocating an aircraft that is too small will result in loss of revenue from passengers turned away, while allocating an aircraft that is too big will result in too many empty seats to cover the high expenses. The airline’s problem is to determine the best aircraft to use for each flight leg such that capacity is matched to demand while minimizing the operating cost. This problem is frequently represented as a time-line network. The network includes a line called a “time-line” for each airport, with nodes positioned along the line in chronological order at each arrival and departure time. Each flight is represented by an arc in the network. Thus for example a flight leaving Washington Dulles (IAD) at 6:00 am (Eastern Standard Time) and arriving at Denver (DEN) at 10:00 am (Eastern Standard Time) would be represented by an arc connecting the 6:00 am node on the IAD time-line to the 10:00 am node on the DEN time-line. (In practice, the arrival time is adjusted to account for the time it takes to prepare the aircraft for the next flight, but we will ignore that here.) In addition to the flight arcs we create an arc from each node on a time line to the consecutive node on the

i

i i

i

i

i 2008/1

page 21

i

i

1.7. Optimization Applications

21

IAD

DEN

SFO

6:00

8:00

10:00

12:00

2:00

4:00

6:00

Figure 1.9. Time-line network. time line, and (assuming the schedule is repeated daily) an arc from the last node returning to the first node. The flow on these arcs represents aircraft on the ground that are waiting for their flight. Figure 1.9 illustrates a time-line network for an airline that has two flights a day each from IAD to DEN, DEN to IAD, DEN to SFO (San Francisco), and SFO to DEN. Define now xij to be the number of aircraft of type i on arc j . Any feasible fleet assignment solution must satisfy the following constraints: (i) Covering constraints: each flight leg must be covered by exactly one aircraft; (ii) Flow-balance constraints: for each node of the network the total number of aircraft of type i entering the node must equal the total number of aircraft of type i exiting the node; (iii) Fleet size constraints: the number of aircraft used of each type must not exceed the number of aircraft available. The objective is to minimize the total cost of the assignment. The problem is by nature integer, but it is generally solved by a series of linear programs where the integrality restrictions are relaxed. Once the fleet is assigned, the individual aircraft of the fleet must be assigned to their flights. This is known as the aircraft routing problem. The planning must take into account the required maintenance for each aircraft. To meet safety regulations, an airline might typically maintain aircraft every 40–45 hours of flying with the maximum time between checks restricted to three to four calendar days. The problem is to determine the most cost effective assignment of aircraft of a single fleet to the scheduled flights, so that all flight legs are covered and aircraft maintenance requirements are satisfied. The last step of the planning cycle is the task of crew scheduling. Breaking down the full planning cycle into steps helps make the planning more manageable, but ultimately it leads to suboptimal schedules (see Exercise 7.2). Researchers are therefore investigating methods that combine two or more of the planning phases together for more profitable schedules.

i

i i

i

i

i

i

22

book 2008/10/23 page 22 i

Chapter 1. Optimization Models

Exercises 7.1. Formulate the fleet scheduling problem corresponding to Figure 1.9. 7.2. Consider an airline that has scheduled the flight legs for the next month. It has done so by breaking down the planning cycle into a sequence of steps: first determine the optimal fleet for this schedule; next route the aircraft within the fleet to the flight legs; and finally assign crews for each of the flight legs. Discuss why this makes the planning more manageable but likely leads to suboptimal schedules.

1.7.2

Support Vector Machines

Suppose that you have a set of data points that you have classified in one of two ways: either they have a certain stated property or they do not. These data points might represent the subject titles of email messages, which are classified as either being legitimate email or spam; or they may represent medical data such as age, sex, weight, blood pressure, cholesterol levels, and genetic traits of patients that have been classified either as high risk or as low risk for a heart attack; or they may represent some features of handwritten digits such as ratio of height to width, curvature, that have been classified either as (say) zero or not zero. Suppose now that you obtain a new data point. Your goal is to determine whether this new point does or does not have the stated property. The set of techniques for doing this is broadly referred to as pattern classification. The main idea is to identify some rule based on the existing data (referred to as the training data) that characterizes the set of points that have the property, which can then be used to determine whether a new point has the property. In its simplest form classification uses linear functions to provide the characterization. Suppose we have a set of m training data xi ∈ n with classification yi , where either yi = 1 or yi = −1. A two-dimensional example is shown in the left-hand side of Figure 1.10, where the two classes of points are designated by circles of different shades. Suppose it is possible to find some hyperplane w Tx + b = 0 which separates the positive points from the negative. Ideally we would like to have a sharp separation of the positive points from the negative. Thus we will require wTxi + b ≥ +1 wTxi + b ≤ −1

for yi = +1, for yi = −1.

There is nothing special about the separation coefficients ± on the right-hand side of the above inequalities. The coefficients w and b of the hyperplane can always be scaled so that the separation will be ± 1. To obtain the best results we would like the hyperplanes separating the positive points from the negative to be as far apart as possible. From basic geometric principles it can be shown that the distance between the two hyperplanes (that is, the separation margin) is 2/ w. Thus among all separating hyperplanes we should seek the one that maximizes this margin. This is equivalent to minimizing w Tw. The resulting problem is to determine the coefficients w and b that solve minimize subject to

f (w, b) = 21 w Tw yi (w Txi + b) ≥ 1,

i = 1, . . . , m.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 23 i

23

wT x + b = 1

wT x + b = −1

margin

Figure 1.10. Linear separating hyperplane for the separable case.

The coefficient 12 in the objective is included for convenience; it results in simpler formulas when analyzing the problem. The right-hand side of Figure 1.10 shows the solution of our two-dimensional example. The training points that lie on the boundary of either of the hyperplanes are called the support vectors; they are highlighted by larger circles. Removal of these points from our training set would change the coefficients of the hyperplanes. Removal of the other training points would leave the coefficients unchanged. The method is called a “support vector machine” because support vectors are used for classifying data as part of a machine (computerized) learning process. Once the coefficients w and b of the separating hyperplane are found from the training data, we can use the value of the function f (x) = wTx + b (our “learning machine”) to predict whether a new point x¯ has the property of interest or not, depending on the sign of f (x). ¯ So far we have assumed that the data set was separable, that is, a hyperplane separating the positive points from the negative points exists. For the case where the data set is not separable, we can refine the approach to the separable case. We will now allow the points to violate the equations of the separating hyperplane, but we will impose a penalty for the violation. Letting the nonnegative variable ξi denote the amount by which the point xi violates the constraint at the margin, we now require w Txi + b ≥ +1 − ξi wTxi + b ≤ −1 + ξi

for yi = +1 for yi = −1.

A common way to impose the penalty is to add to the objective a term proportional to the sum of the violations. The added penalty term takes the form C m i=1 ξ to the objective, where the larger the value of the parameter C, the larger the penalty for violating

i

i i

i

i

i

i

24

book 2008/10/23 page 24 i

Chapter 1. Optimization Models

wT x + b = 1

wT x + b = −1

Figure 1.11. Linear separating hyperplane for the nonseparable case. the separation. Our problem is now to find w, b, and ξ that solve  minimize f (w, b, ξ ) = 12 w Tw + C m i=1 ξi subject to

yi (w Txi + b) ≥ 1 − ξi , ξi ≥ 0.

i = 1, . . . , m,

Figure 1.11 shows an example of the nonseparable case and the resulting separating hyperplane. We see in this example that two of the points (indicated in the figure by the extra squares) are misclassified, since they lie on the incorrect side of the hyperplane wTx +b = 0. In later chapters of this book we will see that many problems have a companion problem called the dual problem, that there are important relations between a problem and its dual, and that these relations sometimes lead to insights for solving the problem. In Section 14.8 we will discuss the dual of the problem of finding the hyperplanes with the largest separation margin. We will show that the dual problem directly identifies the support vectors, and that the dual formulation can give rise to a rich family of nonlinear classifications that are often more useful and more accurate than the linear hyperplane classification we presented here.

Exercises 7.1. Consider two classes of data, where the points (13.3), (0.31.5), (2, 4.2), (2.2, 2.9), (1.7, 3.6), (3, 4), (1, 4) possess a certain property and the points (1.8, 1.5), (3.4, 3.6), (0.2, 2.5), (1, 1.3), (1, 2.5), (3, 1.1), (2, 0.1)

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 25 i

25

do not possess this property. Use optimization software to compute the maximum margin hyperplane that separates the two classes of points. Are the classes indeed separable? What are the support vectors? Repeat the problem when the first class includes also the point (0.2, 2.5) and the second class includes the point (1.7, 3.6). 7.2. In this project we create a support vector machine for breast cancer diagnosis. We use the Wisconsin Diagnosis Breast Cancer Database (WDBC) made publicly available by Wolberg, Street, and Mangasarian of the University of Wisconsin. A link to the data base is made available on the Web page for this book, http://www.siam.org/books/ ot108. There are two files: wdbc.data and wdbc.names. The file wdbc.names gives more details about the data, and you should read it to understand the context. The file wdbc.data gives N = 569 data vectors. Each data vector (in row form) has n = 32 components. The first component is the patient number, and the second is either “M” or “B” depending on whether the data is malignant or benign. You may manually change the entries “M” to “+1” and “B” to “−1”. These entries are the indicators yi . Elements 3 through 32 of each row i form a 30-dimensional vector xiT of observations. (i) Use the first 500 data vectors as your training set. Use a modeling language to formulate the problem for the nonseparable case, using C = 1000. Solve the problem and display the separating hyperplane. Determine whether the data are indeed separable. (ii) Use the output of the run to predict whether the remaining 69 patients have cancer. Compare your prediction to the actual patients’ medical status. Evaluate the accuracy (proportion of correct predictions), the sensitivity (proportion of positive diagnoses for patients with the disease), and the specificity (the proportion of negative diagnoses for patients without the disease).

1.7.3

Portfolio Optimization

Suppose that an investor wishes to select a set of assets to achieve a good return on the investment while controlling risks of losses. The use of nonlinear models to manage investments began in the 1950s with the pioneering work of Nobel Prize laureate Harry Markowitz, who demonstrated how to reduce the risk of investment by selecting a portfolio of stocks rather than picking individual attractive stocks, and established the trade-off between reward and risk in investment portfolios. An investment portfolio is defined by the vector x = (x1 , . . . , xn ), where xj denotes the proportion of the investment to be invested in asset j . Letting μj denote the expected rate of return of asset j , the expected rate of return of the portfolio is μTx. Let  be the matrix of variances and covariances of the assets’ returns. The entry j,j is the variance of investment j . A high variance indicates high volatility or high risk; a low variance indicates stability or low risk. The entry i,j is the covariance of investments i and j . A positive value of i,j indicates assets whose values usually move in the same direction, as often occurs with stocks of companies in the same industry. A negative value indicates assets whose values generally move in opposite directions—a desirable feature

i

i i

i

i

i

i

26

book 2008/10/23 page 26 i

Chapter 1. Optimization Models

in a diversified portfolio. Markowitz defined the risk of the portfolio to be its expected variance x Tx. Our optimization problem has two conflicting objectives: to maximize the return μTx, and to minimize the risk x Tx. The relative importance of these objectives will vary depending on the investor’s tolerance for risk. We introduce a nonnegative parameter α that reflects the investor’s trade-off between risk and return. The objective function in the model will be some combination of the two objectives, parameterized by α, leading to the model maximize f (x) = μTx − αx Tx subject to the constraints



xi = 1

and

x ≥ 0.

i

The value of α reflects the investor’s aversion to risk. A large value indicates a reluctance to take on risk, with an emphasis on the stability of the investment. A low value indicates a high tolerance for risk with an emphasis on the expected return of the investment. It can be difficult to choose a sensible value for α. For this reason it is common to solve this model for a range of values of this parameter. This can reveal how sensitive the solution is to considerations of risk. The solution of the problem for any value of α is called efficient indicating that there is no other portfolio that has a larger expected return and a smaller variance. There are of course some limitations to our model. First, we do not generally know the theoretical (joint) distribution of the assets’ return and will need to estimate the mean and variance from historical data. Denoting the estimate of μ by r and the estimate of  by V , the actual problem we solve is maximize subject to

r Tx − αx TV x  i xi = 1 xi ≥ 0.

Second, investors should be aware that past performance is no indicator of future returns. Finally, we note that the matrix V is dense; that is, it has many nonzero elements. As a result, when the number of assets is large, computations involving V can be expensive thus making the optimization problem computationally difficult. To illustrate portfolio optimization, consider an investor who is planning a portfolio based on four stocks. Data on the rates of return of the stocks in the last six periods are given in Table 1.3. Using this information we estimate the mean of the rate of return as r = ( 0.0667

0.0900

0.0717

0.0733 ) ,

and the variance as ⎛

0.00019 ⎜ 0.00065 V =⎝ 0.00004 0.00308

0.00065 0.00883 0.00218 0.00327

0.00004 0.00218 0.00125 0.00063

⎞ 0.00038 0.00327 ⎟ ⎠. 0.00063 0.00162

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 27 i

27

Table 1.3. Past rates of return of stocks. Period 1 2 3 4 5 6

Stock 1 0.08 0.06 0.07 0.04 0.08 0.07

Stock 2 0.05 0.17 0.05 −0.07 0.12 0.22

Stock 3 0.01 0.09 0.10 0.04 0.08 0.11

Stock 4 0.08 0.12 0.07 −0.01 0.09 0.09

Table 1.4. Optimal portfolio for selected values of α. α 1 2 5 10 100

Stock 1 0 0.12 0.57 0.71 0.87

Stock 2 1 0.65 0.19 0.04 0

Stock 3 0 0.23 0.24 0.25 0.13

Stock 4 0 0 0 0 0

Mean 0.090 0.083 0.072 0.069 0.067

Variance 8.8 ×10−3 4.5 ×10−3 8.0 ×10−4 2.6 ×10−4 1.7 ×10−4

The solution of the optimization problem for a selection of values of the parameter α is given in Table 1.4. Figure 1.12 plots the rate of return against the variance of the optimized portfolios for a continuous range of values of α. The curved line is called the efficient frontier since it depicts the collection of all efficient points. The figure also shows the rate of return and variance obtained when allocating the entire portfolio to one stock only. In this example, a person who has a high tolerance for risk may choose to invest entirely in Stock 2, whereas a person who is extremely cautious may choose to invest entirely in Stock 1. Investing only in Stock 3, or only in Stock 4, or half in Stock 1 and half in Stock 2 are not recommended strategies for anyone, since they are dominated by strategies that have both higher return and lower risk.

Exercises 7.1. How would the formulation to the problem change if a risk-free asset (such as government treasury bills at a fixed rate of return) is also being considered? 7.2. An investor wants to put together a portfolio consisting of the 30 stocks used to determine the Dow Jones industrial average. Use 25 weekly returns ending on the last Friday of last month to find the optimal portfolio. Experiment with different values of the parameter α and plot the corresponding points on the efficient frontier. You will need access to a nonlinear optimization solver. You may need to use a modeling language to formulate the problem for input to the solver.

i

i i

i

i

i

i

28

book 2008/10/23 page 28 i

Chapter 1. Optimization Models

0.095

0.090 Stock 2

Rate of Return

0.085

0.080

0.075 Stock 4 Stock 3

0.070 Stock 1

0.065

1

2

3

4 5 6 Variance in 10e−3

7

8

9

Figure 1.12. Efficient frontier.

1.7.4

Intensity Modulated Radiation Treatment Planning

Radiotherapy is the treatment of cancerous tissues with external beams of radiation. As a beam of radiation passes through the body, energy is deposited at points along its path, and as this happens the beam intensity gradually decreases (this is called attenuation). The radiation dosage is the amount of energy deposited locally per unit mass. High doses of radiation can kill cancerous cells, but will also damage nearby healthy cells. If vital organs receive too much radiation, serious complications may arise. Some limited damage to healthy cells may be tolerable however, since normal cells repair themselves more effectively than cancerous cells. If the radiation dosage is limited, the surrounding organs can continue to function and may eventually recover. The goal of the radiation treatment planning is to design a treatment that will kill the cancer in its entirety but limit the damage to surrounding healthy tissue. To keep the radiation levels of normal healthy tissue low, the treatment typically uses several beams of radiation delivered from different angles. Intensity modulated radiation therapy (IMRT) is an important recent advance that allows each beam to be broken into hundreds (or possibly thousands) of beamlets of varying intensity. This is achieved using a set of metallic leaves (called collimators) that can sequentially move from open to closed position, thus filtering the radiation in a way that not only allows for the modulation of the intensity of the beam, but also enables control of its shape. This enables more accurate radiation treatment. This is particularly important in cases where the tumor has an unusual shape as is the case when it is wrapped around the spinal cord, or when it is close to a vital structure such as the optic nerve. A simplified example of the desired goals for treatment of a hypothetical prostate cancer patient is given in Table 1.5. Radiation dosage is measured in a unit call Gray (Gy). One Gy is equal to one Joule of energy deposited in one kilogram. The planning target volume (PTV) describes a region large enough to incorporate the diseased organ, the

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 29 i

29

Table 1.5. Sample treatment specifications. Volume

Requirement

PTV excluding rectum overlap

Prescription dose Maximum dose Minimum dose 95% of volume ≥

PTV/rectum overlap

Prescription dose 74 Gy Maximum dose 77 Gy Minimum dose 74 Gy

Rectum

Maximum dose 76 Gy 70% of volume ≤ 32 Gy

Bladder

Maximum dose 78 Gy 70% of volume ≤ 32 Gy

80 Gy 82 Gy 78 Gy 79 Gy

cancerous cells, as well as a margin to account for patient movement during the treatment. Organs at risk are the rectum and the bladder. Since the PTV may overlap with the rectum, different treatment specifications are given for the primary region where the PTV is distinct from the rectum, and for the region where they overlap. The specifications for the primary region, for example, include a desired “prescription” dose of 80 Gy at every cell, a minimum dose value of 78 Gy, a maximum dose of 82 Gy, and finally, a “dose-volume” requirement that specifies that 95% of the cells in this region must receive at least 79 Gy. The treatment specification for the bladder includes an upper limit of 72 Gy for the entire organ and a dose-volume requirement that 70% of the organ must receive 32 Gy or less. To determine the treatment plan we will need to define a volume of interest that includes the PTV and any nearby tissue that may be adversely affected by the treatment. We will divide this volume into a three-dimensional grid of small boxes called voxels. We will denote the dose deposited in voxel i by di . A key decision in the treatment planning is the fluence map—the radiation intensity of the beamlets in each beam. Let xj denote the intensity of beamlet j . Then the total radiation dosage deposited in the volume of interest is given approximately by the equation d = Ax. The matrix A is called the fluence matrix and is assumed to be known. Its components ai,j represent the amount of dose absorbed by voxel i per unit intensity emission from beamlet j . The problem is therefore to find a fluence map x that yields a radiation dose d that meets the requirements specified by the physician, as in Table 1.5. As such, this seems to be a feasibility problem, namely one of finding a feasible solution, rather than an optimization problem. Unfortunately the treatment requirements are usually conflicting, and it is impossible to satisfy all the requirements simultaneously. To resolve this, the requirements are usually broken up into “hard” constraints for which any violation is prohibited, and “soft” constraints for which violations are allowed. Typically, hard constraints are included in

i

i i

i

i

i

i

30

book 2008/10/23 page 30 i

Chapter 1. Optimization Models

the formulation as explicit constraints, whereas soft constraints are incorporated into the objective function via some penalty that is imposed for their violation. For example, the requirement that region S in the primary treatment volume will receive a minimum dose l and a maximum dose u could be treated as a hard constraint by explicitly requiring that l ≤ di ≤ u for all i ∈ S. Alternatively the requirement could be treated as a soft constraint, where a violation is allowed, but with penalty. One approach is to include in the objective function the nonlinear term



max(0, l − di )2 + wu max(0, di − u)2 , wl i∈S

i∈S

which sums up the squared deviation from the desired bound for those voxels where the bounds are violated. The parameters wl and wu are weights representing the relative importance of the bounds on the doses and may differ by region. For instance, underdosing the tumor can be more harmful than overdosing it, so the weights for this region satisfy wl ≥ wu . For an alternative way to impose a penalty for violating the bounds on the doses, see the Exercises. The “dose-volume constraints” that specify that a fraction β of some volume must receive a dose of u or less (or a dose of l or more) are more difficult to incorporate. As an example, suppose that the bladder volume in our example has 10,000 voxels. Then at least 7,000 of the voxels must receive 32 Gy or less. To count the number of voxels that exceed 32 Gy we must define an indicator for each voxel that determines whether its dose meets 32 Gy or exceeds it. This can be done by defining for each voxel a variable yi that is either zero or one, depending on whether the dose meets the desired upper limit or not. Then adding the constraints

di ≤ 32(1 − yi ) + 78yi , yi ≤ 3,000, yi ∈ {0, 1} i∈S

enforces the dose-volume constraints. The first constraint implies that if di exceeds 32 Gy, then yi must be one; the second implies that the number of voxels where the dose exceeds 32 Gy is at most 3,000. This formulation expresses the dose-volume requirements as hard constraints. However models with integer variables can be difficult to solve and may require a specialized implementation. For this reason, some researchers prefer other formulations. One way to use a soft constraint for the dose-volume requirement is to add to the objective function a penalty term of the form

w max(0, di − 32)2 , i∈S(d)

where S(d) is the set of 7,000 voxels (out of the 10,000) with the lowest dose, and w is the weight of the penalty. Unfortunately, we have traded one difficulty for another. In this alternative formulation, the penalty term does not have continuous derivatives (see the Exercises), which can create challenges for many optimization algorithms. One may wonder why there are so many different models and formulations. There are several reasons. First, because the requirements are conflicting, there is no consensus

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 31 i

31

among physicians as to what should be a hard constraint and what should be a soft constraint. Second, physicians have other desired objectives in the treatment that are extremely important yet cannot be adequately modeled. For example, they are concerned about the tumor control probability—the probability that the dose delivered will indeed kill the tumor. However models that incorporate these probabilities directly are computationally impractical. As another example, physicians obtain important information from the shape of the dose-volume histogram, a graph displaying for each dose level the percentage of the volume that receives at least that dose amount. Ideally one would like to include constraints that enforce the dose-volume histogram to have a “good” shape, but this would amount to including numerous dose-volume constraints, which again is computationally impractical. A third factor is the trade-off between solution time and solution quality. Most commercial systems use the weighted sum of penalties since these can typically be solved efficiently. However, because all the constraints are “soft,” the solutions are not always adequate. The solutions can sometimes include undesirable features, such as regions of low dosage (“cold spots”) within the tumor, or regions of high dosage (“hot spots”) in healthy tissue. The problem of optimizing the fluence map can be immense. The number of voxels may range from tens of thousands to hundreds of thousands. Typically a treatment may use 5–10 beams, and the number of beamlets per beam can run into the thousands. Even if the direction of the beams is prescribed, the problem can be challenging. The problem becomes even harder if one attempts to optimize the number of beams and their directions, in addition to their fluence. There is an additional challenge. Recall that the beamlets are formed by the movement of the leaf collimators; the longer a leaf is open, the more dose it allows to pass through. It is also necessary to determine the sequence of leaf positions and length of their open times that creates the desired fluence map—or an approximation to it—in a total sequencing time that does not unduly prolong the patient’s total treatment time.

Exercises 7.1. One possible way to allow some violation of the constraint l ≤ di in a region S is to introduce for each voxel i in S two new nonnegative variables si and si satisfying di − si + si = li si , si ≥ 0,  and to include a penalty term of the form wl i∈S si in the objective. Explain why this approach would work, and derive an equivalent approach for the constraint di ≤ u. 7.2. The purpose of this exercise is to show that when the dose-volume requirements are included as soft constraints in the objective, the resulting penalty term may have discontinuous derivatives. Consider a region with only two voxels, and suppose that it is required that not more than half the voxels exceed a dose of u. Show that the approach described in this section for incorporating this requirement as a soft constraint adds a penalty term of the form w max(0, (mini=1,2 {di } − u))2 to

i

i i

i

i

i

i

32

book 2008/10/23 page 32 i

Chapter 1. Optimization Models the objective. Evaluate the gradient of this penalty term at points where it exists. Determine whether the first derivatives are continuous on d ≥ 0.

1.7.5

Positron Emission Tomography Image Reconstruction6

Positron emission tomography (PET) is a medical imaging technique that helps diagnose disease and assess the effect of treatment. Unlike other imaging techniques such as Xrays or CT-scans that directly study the anatomical structure of an organ, PET studies the physiology (blood flow or level of metabolism) of the organ. Metabolic activity is an important tool in diagnosis: cancerous cells have high metabolism or high activity, while tumor cells damaged by irradiation have low metabolism or low activity. Alzheimer’s disease is indicated by regions of reduced activity in the brain, and coronary tissue damage is indicated by regions of reduced activity in the heart. In a PET scan the patient is injected with a radioactively labeled compound (most commonly glucose, but sometimes water or ammonia) that is selected for its tendency to be absorbed in the organ of interest. Once the compound settles, it starts emitting radioactive emissions that are counted by the PET scanner. The level of emissions is proportional to the amount of drug absorbed, or in turn, to the level of cell activity. The emissions are counted using a PET scanner that surrounds the body. Based on the emissions counts obtained in the scanner, the goal is to determine the level of emissions from within the organ, and hence the level of metabolic activity. The output of the reconstruction is typically presented in a color image that reflects the different activity levels in the organ. We describe the physics of PET in further detail. As the radioisotope decays, it emits positrons. Each positron annihilates with an electron, and produces two photons which move in nearly opposite directions, each hitting a tiny photodetector within the scanner at almost the same time. Any near-simultaneous detection of an event by two such detectors defines a coincidence event along a coincidence line. The number of coincidence events yj detected along each of the possible coincidence lines j is the input to the image reconstruction. Consider the situation depicted in Figure 1.13, where a grid of boxes or voxels has been imposed over the emitting object (for simplicity, the figure is depicted in two dimensions; the concept is readily extended to three dimensions). Given a set of measurements yj along the coincidence lines j = 1, . . . , N, we seek to estimate xi , i = 1, . . . n, the expected number of counts emitted from voxel i, where n is the number of voxels in the grid. Most reconstruction methods are based on a technique known as filtered back projection. Although this technique yields fast reconstructions, the quality of the image can be poor in situations where the amount of radioactive substance used must be small. Under such situations it is necessary to use a statistical model of the emission process to determine the most likely image that fits the data. The approach is via the maximum likelihood estimation technique. The radioactive emissions from voxels i = 1, . . . , n are assumed to be statistically independent random variables that follow a Poisson distribution with mean xi . Denote by Ci,j the probability that an emission emanating from voxel i will hit detector pair (coincidence line) j . The n × N matrix C = Ci,j depends on the geometry of the scanner and on the tissue being scanned, and is assumed to be known. 6 This

section requires some basic concepts from probability theory.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 33 i

33

Figure 1.13. PET. Using these assumptions one can show that the emissions emanating from voxel i and hitting detector pair j are also independent Poisson variables with mean rate Ci,j xi , and the total emissions received by the detector pairs j = 1, . . . , N are independent Poisson dis tributed variables with mean rate i Ci,j xi . Let q = CeN where eN is a vector of 1’s. The vector q denotes the sum of the columns of C (which need not be 1). It is computationally easier if we write the optimization model using the logarithm of the likelihood function. If we ignore a constant term, the resulting logarithm is fML = −q T x +



  yj log C Tx j .

j

(See the Exercises.) Since the emission level is nonnegative, the final reconstruction problem becomes    maximize fML = −q T x + j yj log C Tx j subject to x ≥ 0. The size of the problem can be enormous. If one wishes to reconstruct, say, a volume of, say, 5 cubic cm at a resolution of half a millimeter, then the size of the grid would be 100 by 100 by 100, corresponding to n = 100,000 variables. Problems of this size and even larger are not uncommon. The size of the data is also huge. The scanner may have thousands of photodetectors and since any pair of these can define a coincidence line, the number of coincidence lines N can be on the order of millions. Since every function evaluation requires the computation of a matrix product C Tx, and the matrix C is large, the function evaluations are time consuming. The efficient solution of such large problems often requires understanding of their structure. By structure we mean special characteristics of the function, its gradient, and Hessian. Often structure is associated with the sparsity pattern of the Hessian, that is the number of zeros, and possibly their location. The special structure of fML and its derivatives

i

i i

i

i

i

i

34

book 2008/10/23 page 34 i

Chapter 1. Optimization Models

can be used in designing effective methods for solving the problem. Here we will just give the formulas for the derivatives. Defining yˆ = C T x, we can write the gradient and Hessian of the objective function, respectively, as ∇fML (x) = −q + C Yˆ −1 y, ∇ 2 fML (x) = −C Y Yˆ −2 C T , where Y = diag(y) and Yˆ = diag(y). ˆ The matrix C itself is sparse, and only a small fraction of its entries are nonzero. The diagonal matrices Y and Yˆ are of course also sparse. Even so, the Hessian ∇ 2 fML (x) is dense; almost all of its entries are likely to be nonzero. A key challenge in the design of effective algorithms is to exploit the sparsity of C.

Exercises 7.1. The goal of this exercise is to derive the maximum likelihood model for PET image reconstruction. Parts (a) and (b) require some basic background in stochastic methods. (i) Let Zij be the number of events emitted from voxel i and detected at coincidence line j , and let Yj be the total emissions received by detector pair j , for j = 1, . . . , N. Use the assumptions given in the section to prove that Zij are independent Poisson variables with mean Ci,j xi , and that  Yj are independent Poisson distributed variables with mean rates yˆj = i Ci,j xi . (ii) Prove that the likelihood may be written as  e− i Ci,j xi ( Ci,j xi )yj  e−yˆj yˆ yj j i = . P {y|x} = yj ! yj ! j

j

(iii) Prove the final expression for the maximum likelihood estimation objective function fML . Hint: Take the logarithm of the likelihood and omit the constant term that does not depend on x. 7.2. Derive the formulas for the gradient and Hessian matrix of fML . 7.3. The purpose of this exercise is to show that the Hessian of fML may be dense, even when its matrix factors are sparse. Suppose that C = ( I I en ) and y = yˆ = e2n+1 where I is the identity matrix, and ek is a vector of ones of size k. Show that every element of the Hessian is nonzero. 7.4. The purpose of this problem is to write a program in the modeling language of your choice to solve a PET image reconstruction problem. Your model should not only be correct, but also efficient and clear. Try and make your model as general as possible. (i) Develop the model and test it on a problem with n = 9 variables corresponding to a 3 × 3 grid, and with N = 33 detector pairs. The data are   C= B B B ,

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 35 i

35 where B is a sparse n × (n + 2) matrix with the following nonzero entries: Bi,i = a,

Bi,i+1 = b,

Bi,i+2 = a,

i = 1, . . . , n,

where a = 0.18,

b = 0.017,

and yT = ( 0 0 1

0 0 0

1 1 1

19 7 3

27 20 17

30 38 38

40 56 40

50 55 20

35 38 7

15 20 1

1 ... 7 ... 0 ).

(ii) Test your software on a problem with n = 1080 variables corresponding to a 36 × 30 grid, and with N = 1444 detector pairs. The data are   C = B 2B , where B is defined as in part (a) with the parameter values a = 0.15 and b = 0.05. The vector y can be downloaded in text format from the Web page for this book (http://www.siam.org/books/ot108). Display the values of the first row of the reconstructed image. (iii) Identify the image you obtained in (ii). You will need software for displaying intensity images.

1.7.6

Shape Optimization

In this section we show how nonlinear optimization can address a problem of finding the shape of a hanging cable, which in equilibrium minimizes the potential energy of the cable. This problem often is called the catenary problem (from the Latin word “catena” meaning a chain). The solution to the simplest case of the hanging cable problem, when the mass of the cable is uniformly distributed along the cable, was found at the end of the 18th century independently by John Bernoulli, Christian Huygens, and Gottfried Leibniz. More recently, the catenary has played an important role in civil engineering. The solution to the catenary problem helps understand the effects on suspended cables of external applied forces arising from the live loads on a suspension bridge. Here we demonstrate how a general hanging cable problem can be modeled as an optimization problem. We present several optimization models to illustrate that sometimes a physical problem can have multiple equivalent mathematical formulations, some of which are numerically tractable while others are not. First, for simplicity we assume that the mass of the cable is distributed uniformly. The objective will be to minimize the potential energy of the cable  xb  minimize y(x) 1 + y (x)2 dx. y(x)

xa

i

i i

i

i

i

i

36

book 2008/10/23 page 36 i

Chapter 1. Optimization Models 0

- 0. 5

-1

- 1. 5

-2

-2. 5

-3

- 3. 5

-4

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

Figure 1.14. Hanging cable with uniformly distributed mass. Here y(x) is the height of the cable measured from some zero level, and 1 + y (x)2 dx is the arc length, which is proportional to mass since the mass is distributed uniformly. The model also has constraints: the cable has a specified length L  xb  1 + y (x)2 dx = L, xa

and the ends of the cable are fixed y(xa ) = ya ,

y(xb ) = yb .

It can be shown that the solution to this problem is a hyperbolic cosine   1 y(x) = C0 cosh x+C + C2 , C0 where cosh(x) = (ex + e−x )/2 and the values of C0 , C1 , and C2 are determined by the constraints. Figure 1.14 shows the graphical representation of y(x). In contrast to our previous optimization models where we had a finite number of variables, here we are seeking an optimal function, that is, an infinite continuum of values. In order to solve such a problem using nonlinear optimization algorithms, we discretize the function by approximating it at a finite number of points, as shown in Figure 1.15. Here we describe the simplest method for discretizing such problems. If xa = x0 < x1 < · · · < xN−1 < xN = xb is a uniform discretization of segment [xa , xb ] such that x = x1 − x0 = x2 − x1 = · · · = xN − xN −1 , a simple approximation to an integral of a function f (x) is  b N −1

f (x)dx ≈ f (xi ) x. a

i=0

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 37 i

37 A

B

0

- 0. 5

-1

-1. 5

-2

- 2. 5

Δl

-3

Δy

Δx - 3. 5

-4

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

Figure 1.15. Discretized hanging cable with uniformly distributed mass. The function values used to approximate the integral for the shape optimization problem are f (xi ) = y(xi ) 1 + y (xi )2 . We will approximate the values of the derivative y (x) at the discretization points xi by yi =

yi+1 −yi , x

i = 0, 1, . . . , N − 1,

where yi = y(xi ). The discretized problem consists of finding variables yi , i = 1, . . . , N −1, and yi , i = 0, . . . , N − 1, that solve the problem

N −1

 yi 1 + (yi )2 x

minimize

E(y, y ) =

subject to

yi+1 = yi + yi x,

i=0

N −1 

i = 0, . . . , N − 1

1 + (yi )2 x = L

i=0

y0 = ya ,

yN = yb .

We refer to this as optimization model 1. The greater the number of discretizations points N, the better the solution to optimization model 1 approximates the solution of the original problem.However for very large N, 2 the optimization model 1 is difficult to solve. The constraint N i=1 1 + (yi ) x = L is nonlinear and can be a source of numerical difficulties for optimization algorithms. In the two-dimensional case this constraint defines the perimeter shown in Figure 1.16 (left). The point x0 is on the perimeter and hence is feasible, but almost any perturbation of x0 will move off the perimeter and hence out of the feasible region. Fortunately, there is another formulation of the catenary problem that leads to a more tractable model. Rather than representing the cable as a function y(x) of the variable x, we parameterize it as a function of its length with respect to its left end point. The points on the cable will

i

i i

i

i

i

i

38

book 2008/10/23 page 38 i

Chapter 1. Optimization Models 5

4

3

2

1

0

-1

-2

x0

-3

-4

-5 -5

-4

-3

-2

-1

0

1

2

3

4

5

Figure 1.16. Feasible regions. now have the form (x(l), y(l)), l ∈ [0, L]. This representation leads to a model that is simpler to analyze both mathematically and numerically. Now we look for (x(l), y(l)), l ∈ [0, L], which minimizes the potential energy  L min m(l)y(l)dl 0

subject to a constraint based on the Pythagorean theorem that defines the relations between dx, dy, and dl (see Figure 1.15), dx 2 + dy 2 = dl 2 , and the ends of the cable are fixed x(0) = xa ,

x(L) = xb , y(L) = yb . L Here m(l) is a mass distribution function such that 0 m(l)dl = M is the total mass of the cable. The discretization of this problem with the uniform distribution of mass and the total mass of the cable M consists of finding variables xl , l = 1, . . . , N − 1, and yi , i = 1, . . . , N − 1, using the following optimization model 2: minimize

y(0) = ya ,

E(y) =

M N

N

yl

l=0

subject to

(xl − xl−1 )2 + (yl − yl−1 )2 = x0 = xa , xN = xb y0 = ya , yN = yb ,

 L 2 N

,

l = 1, . . . , N

where the mass distribution function is m = const = M/N. This optimization model also has N nonlinear constraints:  2 (xl − xl−1 )2 + (yl − yl−1 )2 = NL , l = 1, . . . , N, which again can be a potential source of difficulties for optimization algorithms if N is large (the two-dimensional case is shown in Figure 1.16 (center)). However, the optimization model 2 can be simplified substantially by relaxing these constraints into inequalities:  2 (xl − xl−1 )2 + (yl − yl−1 )2 ≤ NL , l = 1, . . . , N.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 39 i

39 10

9.5

9

8.5

8

7.5

7

6.5 correct model relaxed model 6

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

Figure 1.17. Constraints cannot always be relaxed.

Of course, we changed the formulation, which is legitimate only if we can prove that the new formulation has the same solution as the original one. In other words, we have to prove that both optimization model 2 and its relaxation have the same solution. We can prove this by contradiction. Suppose that the optimal solution of the relaxed model satisfies at least one constraint as a strict inequality. Then we can lower the discretized components of the solution corresponding to this constraint and still remain feasible. But lowering part of the cable decreases the potential energy, i.e., it decreases the objective function, so our solution could not have been optimal. This contradicts our original assumption. Thus optimization model 2 and its relaxation have the same optimal solutions. But the two models are not equivalent computationally, since the feasible region for the relaxation has properties that make it easier for optimization algorithms to handle. In the two-dimensional case, the feasible region of the relaxed optimization model 2 is shown in Figure 1.16 (right). It is the entire circle, not just its perimeter. If x0 is a feasible point in the interior of the feasible region, any small perturbation of x0 is also in the interior. This feasible region has a convex shape; i.e., if we connect any two points from the feasible set, all the points between them are also feasible. This property of the interior of feasible set helps some optimization algorithms, later described in the book, efficiently find the solution. It is apparently not possible to relax the constraints of optimization model 1 without changing the optimal solution, but it is easy to do so with optimization model 2. Relaxation of the nonlinear equality in optimization model 1 to an inequality N 

1 + (yi )2 x ≤ L

i=1

gives a model that is not equivalent and can result in an incorrect solution as shown in Figure 1.17. In this example, the length of an optimal cable for the relaxed model is less than L.

i

i i

i

i

i

i

40

book 2008/10/23 page 40 i

Chapter 1. Optimization Models 0

−0.5

−1

−1.5

−2

−2.5

−3

−3.5

−4

−4.5

0

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

Figure 1.18. Hanging cable with a nonuniform mass distribution.

Optimization model 2 has another attractive property. Mathematicians in the 18th century assumed that the string is flexible and uniform, which implies that every segment of equal length has equal mass. This assumption is too restrictive for modern engineering. In many practical problems the total weight of the cable is not uniformly distributed along the cable. If the mass distribution function is not uniform along the cable but instead is a general known function m(l), then it is still easy to obtain a solution of a hanging cable problem using N +1 optimization model 2. We just have to replace the objective function M i=0 yi with a more N N +1 general linear objective function i=0 mi yi with appropriately selected coefficients mi corresponding to a certain distribution of mass along the cable. For example, if the mass of most nodes is much smaller than that of three special nodes—the center node and the two nodes one quarter of the length away from both end points—then it is still easy to find the shape of such a cable (see Figure 1.18). We would not be able to easily model such a case using optimization model 1, for which the assumption of uniformly distributed mass is essential. We conclude the section by emphasizing the importance of proper modeling of a problem. It is the responsibility of a modeler not to make the formulation more difficult than it need be. A problem that is computationally challenging in one formulation may become much easier to solve in a different formulation. It is up to the modeler to carefully consider the merits of a formulation prior to solving the problem.

1.8

Notes

Further information on integer programming can be found in the book by Wolsey (1998). References on global optimization are listed in the Notes for Chapter 2. Overviews of the crew scheduling, fleet assignment problem, and other airline scheduling problems are given in the articles by Barnhart et al. (1999) and Gopalan and Talluri (1998);

i

i i

i

i

i

i

1.8. Notes

book 2008/10/23 page 41 i

41

methods for solving the related linear program are described in the paper by Bixby et al. (1992). The portfolio problem is described in the book by Markowitz and Todd (2000). An innovative approach to calculating the entire efficient frontier by solving just one linear programming problem using a specialized parametric method was developed by Ruszczynski and Vanderbei (2003). The concept of support vector machines was initially developed by Vapnik (1998) in the late 1970s. A comprehensive overview on the subject is found in the tutorial by Burges (1988). More recent research is discussed in the books by Cristianini and Shawe-Taylor (2000), and by Schökopf et al. (1999). Overviews of IMRT planning can be found in the articles by Shepard et al. (1999) and by Lee and Deasy (2006). The book by Herman (1980) and the papers by Shepp and Vardi (1982) and Lange and Carson (1984) are among the pioneering works pertaining to PET. Figure 1.13 is due to Calvin Johnson, and was taken from the paper by Johnson and Sofer (2001). Further applications of optimization can be found in the books by Vanderbei (2007), and by Fourer, Gay, and Kernighan (2003). The hanging cable or catenary problem was first posed in the Acta Eruditorium in 1690 by Jacob Bernoulli. Simple catenary problems can be solved analytically. More complicated cases, those with nonuniformly distributed mass, may have to be solved numerically. More details about how to find shapes of a hanging cable analytically and numerically can be found in the paper of Griva and Vanderbei (2005) and many books on variational calculus; see, e.g., Gelfand and Fomin (1963, reprinted 2000).

i

i i

i

i

book 2008/10/23 page 42 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 43 i

Chapter 2

Fundamentals of Optimization

2.1

Introduction

This chapter discusses basic optimization topics that are relevant to both linear and nonlinear problems. Sections 2.2–2.4 discuss local and global optima, convexity, and the general form of an optimization algorithm. These topics have traditionally been considered as fundamental topics in all areas of optimization. The later sections of the chapter, discussing rates of convergence, series approximations to nonlinear functions, and Newton’s method for nonlinear equations, are most relevant to nonlinear optimization. In fact, Part II on linear programming can be understood without these later sections. The later topics are basic to discussions of nonlinear optimization, since they allow us to derive optimality conditions and develop and analyze algorithms for optimization problems involving nonlinear functions. Although not essential, these topics give a fuller understanding of linear programming as well. For example, “interior-point” methods apply nonlinear optimization techniques to linear programming. They might use Newton’s method to find a solution to the optimality conditions for a linear program, or use a nonlinear optimization algorithm on a linear programming problem. The tools from this chapter underlie the interior-point methods derived in Chapter 10.

2.2

Feasibility and Optimality

There are a variety of terms that are used to describe feasible and optimal points. We first discuss the terms associated with feasibility. We consider a set of constraints of the form gi (x) = 0,

i ∈ E,

gi (x) ≥ 0,

i ∈ I.

Here { gi } are given functions that define the constraints in the model, E is an index set for the equality constraints, and I is an index set for the inequality constraints. Any set 43

i

i i

i

i

i

i

44

book 2008/10/23 page 44 i

Chapter 2. Fundamentals of Optimization

of equations and inequalities can be rearranged in this form. For example, the equation 3x12 + 2x2 = 3x3 − 9 could be written as g1 (x) = 3x12 + 2x2 − 3x3 + 9 = 0, and the inequality sin x1 ≤ cos x2 is equivalent to g2 (x) = − sin x1 + cos x2 ≥ 0. Such transformations are merely cosmetic, but they simplify the notation for describing the constraints. A point that satisfies all the constraints is said to be feasible. The set of all feasible points is termed the feasible region or feasible set. We shall denote it by S. At a feasible point x, ¯ an inequality constraint gi (x) ≥ 0 is said to be binding or active ¯ = 0, and nonbinding or inactive if gi (x) ¯ > 0. The point x¯ is said to be on the if gi (x) boundary of the constraint in the former case, and in the interior of the constraint in the latter. All equality constraints are regarded as active at any feasible point. The active set at a feasible point is defined as the set of all constraints that are active at that point. The set of feasible points for which at least one inequality is binding is called the boundary of the feasible region. All other feasible points are interior points. (Interior points are only “interior” to the inequality constraints. If equality constraints are present, any feasible point will satisfy them. Since it is not possible to be interior to an equality constraint, some authors use the term relative interior points.) Figure 2.1 illustrates the feasible region defined by the constraints g1 (x) = x1 + 2x2 + 3x3 − 6 = 0 g2 (x) = x1 ≥ 0 g3 (x) = x2 ≥ 0 g4 (x) = x3 ≥ 0. At the feasible point xa = (0, 0, 2)T, the first two inequality constraints x1 ≥ 0 and x2 ≥ 0 are active, while the third is inactive. At the point xb = (3, 0, 1)T only the second inequality is active, while at the interior point xc = (1, 1, 1)T none of the inequalities are active. The boundary of the feasible region is indicated by bold lines. Let us now look at terms associated with optimality. It may seem surprising that there is any question about what is meant by a “solution” to an optimization problem. The confusion arises because there are a variety of conditions associated with an optimal point and each of these conditions gives rise to a slightly different notion of a “solution.” Let us consider the n-dimensional problem minimize f (x). x∈S

There is no fundamental difference between minimization and maximization problems. We can maximize f by solving minimize (−f (x)), x∈S

and then multiplying the optimal objective value by −1. For this reason, it is sufficient to discuss minimization problems only.

i

i i

i

i

i

i

2.2. Feasibility and Optimality

book 2008/10/23 page 45 i

45 x3

xa xc

xb

x2

x1

Figure 2.1. Example of feasible region.

strict global minimizer

no global minimizer

nonstrict global minimizer

Figure 2.2. Examples of global minimizers. The set S of feasible points is usually defined by a set of constraints, as above. For problems without constraints, the set S would be n , the set of vectors of length n whose components are real numbers. The most basic definition of a solution is that x∗ minimizes f if f (x∗ ) ≤ f (x)

for all x ∈ S.

The point x∗ is referred to as a global minimizer of f in S. If in addition x∗ satisfies f (x∗ ) < f (x)

for all x ∈ S such that x = x∗ ,

then x∗ is a strict global minimizer. Not all functions have a finite global minimizer, and even if a function has a global minimizer there is no guarantee that it will have a strict global minimizer; see Figure 2.2. It would be satisfying theoretically, and important practically, to be able to find global minimizers. However, many of the methods that we will study are based on the Taylor

i

i i

i

i

i

i

46

book 2008/10/23 page 46 i

Chapter 2. Fundamentals of Optimization

strict local minimizer (global)

strict local minimizer

nonstrict local minimizers

strict local minimizer

Figure 2.3. Examples of local minimizers. series; that is, they are based on information about the function at a single point, and this information is normally only be valid within a small neighborhood of that point (see Section 2.6). Without additional information or assumptions about the problem it will not be possible to guarantee that a global solution has been found. An important exception is in the case where the function f and the set S are convex (see Section 2.3), which is true for linear programming problems. If we cannot find the global solution, then at the least we would like to find a point that is better than its surrounding points. More precisely, we would like to find a local minimizer of f in S, a point satisfying f (x∗ ) ≤ f (x)

for all x ∈ S such that x − x∗  < .

Here  is some small positive number that may depend on x∗ . The point x∗ is a strict local minimizer if f (x∗ ) < f (x)

for all x ∈ S such that x = x∗ and x − x∗  < .

Various one-dimensional examples are illustrated in Figure 2.3. In many important cases, strict local minimizers can be identified using first and second derivative values at x = x∗ , and hence they can be identified by algorithms that compute first and second derivatives of the problem functions. (A local minimizer that is not a strict local minimizer is a degenerate case and is often considered to be a special situation.) Many algorithms, in particular those that only compute first derivative values, are only guaranteed to find a stationary point for the problem. (For unconstrained problems a stationary point is a point where the first derivatives of f are equal to zero. For constrained problems the definition is more complicated; see Chapter 14.) A local minimizer of f is also a stationary point of f but the reverse need not be true. Having all these various definitions of what is meant by a solution may seem perverse, but it merely reflects the fact that if we only have limited information, then we can draw only limited conclusions. The definitions are not without merit, though. In the case where all these various types of solutions are defined and where the function has several continuous

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 47 i

47

derivatives, a global solution will also be both a local solution and a stationary point. In important special cases such as linear programming the reverse will also be true. In our experience, it is unusual for an algorithm to converge to a point that is a stationary point but not a local minimum. However, it is common for an algorithm to converge to a local minimum that is not a global minimum. It may seem troubling that a local but not global solution is often found, but in many practical situations this can be acceptable if the local minimizer produces a satisfactory reduction in the value of the objective function. For example, if the objective function represented the costs of running a business, a 10% reduction in these costs would be a valuable saving, even if it did not correspond to the global solution to the optimization problem. Local optimization techniques are a valuable tool even if global solutions are desired, since techniques for global optimization typically solve a sequence of local optimization problems.

Exercises 2.1. Consider the feasible region defined by the constraints √ 1 − x12 − x22 ≥ 0, 2 − x1 − x2 ≥ 0, and

x2 ≥ 0.

For each of the following points, determine whether the point is feasible or infeasible, and (if it is feasible) whether it is interior to or on the boundary of each of the constraints: xa = ( 12 , 12 )T, xb = (1, 0)T, xc = (−1, 0)T, xd = (− 12 , 0)T, and xe = √ √ (1/ 2, 1/ 2)T. 2.2. Consider the one-variable function f (x) = (x + 1)x(x − 2)(x − 5) = x 4 − 6x 3 + 3x 2 + 10x. Graph this function and locate (approximately) the stationary points, local minima, and global minima. 2.3. Consider the problem minimize f (x) = x1 subject to x12 + x22 ≤ 4 x12 ≥ 1. Graph the feasible set. Use the graph to find all local minimizers for the problem, and determine which of those are also global minimizers. 2.4. Consider the problem minimize subject to

f (x) = x1 (x1 − 1)2 + x22 = 1 (x1 + 1)2 + x22 = 1.

Graph the feasible set. Are there local minimizers? Are there global minimizers? 2.5. Give an example of a function that has no global minimizer and no global maximizer.

i

i i

i

i

i

i

48

book 2008/10/23 page 48 i

Chapter 2. Fundamentals of Optimization

2.6. Provide definitions for a global maximizer, a strict global maximizer, a local maximizer, and a strict local maximizer. 2.7. Consider minimizing f (x) for x ∈ S where S is the set of integers. Prove that every point in S is a local minimizer of f . 2.8. Let S = { x : gi (x) ≥ 0, i = 1, . . . , m } and assume  the functions  that

{ gi } are continuous. Prove that if gi (x) ˆ > 0 for all i, then x : x − xˆ  <  ⊂ S for some  > 0. 2.9. Let S be the feasible region in Figure 2.1. Show that S can be represented by equality and inequality constraints in such a way that it has no interior points. Thus the interior of a set may depend on the way it is represented. 2.10. Let S = { x : gi (x) ≥ 0, i = 1, . . . , m } and assume that the functions { gi } are continuous. Assume that there exists a point xˆ such that gi (x) ˆ > 0 for all i. Prove that S has a nonempty interior regardless of how S is represented.

2.3

Convexity

There is one important case where global solutions can be found, the case where the objective function is a convex function and the feasible region is a convex set. Let us first talk about the feasible region. A set S is convex if, for any elements x and y of S, αx + (1 − α)y ∈ S

for all 0 ≤ α ≤ 1.

In other words, if x and y are in S, then the line segment connecting x and y is also in S. Examples of convex and nonconvex sets are given in Figure 2.4. More generally, every set defined by a system of linear constraints is a convex set; see the Exercises. A function f is convex on a convex set S if it satisfies f (αx + (1 − α)y) ≤ αf (x) + (1 − α)f (y) for all 0 ≤ α ≤ 1 and for all x, y ∈ S. This definition says that the line segment connecting the points (x, f (x)) and (y, f (y)) lies on or above the graph of the function; see Figure 2.5. Intuitively, the graph of the function is bowl shaped. Analogously, a function is concave on S if it satisfies f (αx + (1 − α)y) ≥ αf (x) + (1 − α)f (y)

convex

nonconvex

Figure 2.4. Convex and nonconvex sets.

i

i i

i

i

i

i

2.3. Convexity

book 2008/10/23 page 49 i

49

f f ( y) α f ( x) + (1−α) f ( y )

f ( x) f ( α x+(1−α) y )

α x+(1−α) y

x

y

Figure 2.5. Convex function. for all 0 ≤ α ≤ 1 and for all x, y ∈ S. Concave functions are explored in the Exercises below. Linear functions are both convex and concave. We say that a function is strictly convex if f (αx + (1 − α)y) < αf (x) + (1 − α)f (y) for all x = y and 0 < α < 1 where x, y ∈ S. Let us now return to the discussion of local and global solutions. We define a convex optimization problem to be a problem of the form minimize f (x), x∈S

where S is a convex set and f is a convex function on S. A problem minimize subject to

f (x) gi (x) ≥ 0, i = 1, . . . , m,

is a convex optimization problem if f is convex and the functions { gi } are concave; see the Exercises. The following theorem shows that any local solution of such a problem is also a global solution. This result is important to linear programming, since every linear program is a convex optimization problem. Theorem 2.1 (Global Solutions of Convex Optimization Problems). Let x∗ be a local minimizer of a convex optimization problem. Then x∗ is also a global minimizer. If the objective function is strictly convex, then x∗ is the unique global minimizer. Proof. The proof is by contradiction. Let x∗ be a local minimizer and suppose, by contradiction, that it is not a global minimizer. Then there exists some point y ∈ S satisfying

i

i i

i

i

i

i

50

book 2008/10/23 page 50 i

Chapter 2. Fundamentals of Optimization

f (y) < f (x∗ ). If 0 < α < 1, then f (αx∗ + (1 − α)y) ≤ αf (x∗ ) + (1 − α)f (y) < αf (x∗ ) + (1 − α)f (x∗ ) = f (x∗ ). This shows that there are points arbitrarily close to x∗ (i.e., when α is arbitrarily close to 1) whose function values are strictly less than f (x∗ ). These points are in S because S is convex. This contradicts the definition of a local minimizer. Hence a point such as y cannot exist, and x∗ must be a global minimizer. If the objective function is strictly convex, then a similar argument can be used to show that x∗ is the unique global minimizer; see the Exercises. For general problems it may be as difficult to determine if the function f and the region S are convex as it is to find a global solution, so this result is not always useful. However, there are important practical problems, such as linear programs, where convexity can be guaranteed. We conclude this section by defining a convex combination (weighted average) of a finite set of points. A convex combination is a linear combination whose coefficients are nonnegative and sum to one. Algebraically, the point y is a convex combination of the points { xi }ki=1 if k

αi x i , y= i=1

where

k

αi = 1

and

αi ≥ 0,

i = 1, . . . , k.

i=1

There will normally be many ways in which y can be expressed as a convex combination of { xi }. As an example, consider the points x1 = (0, 0)T, x2 = (1, 0)T, x3 = (0, 1)T, and x4 = (1, 1)T. If y = ( 12 , 12 )T, then y can be expressed as a convex combination of { xi } in the following ways: y = 0x1 + 12 x2 + 12 x3 + 0x4 = 12 x1 + 0x2 + 0x3 + 12 x4 = 14 x1 + 14 x2 + 14 x3 + 14 x4 , and so forth.

2.3.1

Derivatives and Convexity

If a one-dimensional function f has two continuous derivatives, then an alternative definition of convexity can be given that is often easier to check. Such a function is convex if and only if f (x) ≥ 0 for all x ∈ S;

i

i i

i

i

i

i

2.3. Convexity

book 2008/10/23 page 51 i

51

see the Exercises in Section 2.6. For example, the function f (x) = x 4 is convex on the entire real line because f (x) = 12x 2 ≥ 0 for all x. The function f (x) = sin x is neither convex nor concave on the real line because f (x) = − sin x can be both positive and negative. In the multidimensional case the Hessian matrix of second derivatives must be positive semidefinite; that is, at every point x ∈ S y T∇ 2 f (x)y ≥ 0

for all y;

see the Exercises in Section 2.6. (The Hessian matrix is defined in Appendix B.4.) Notice that the vector y is not restricted to lie in the set S. The quadratic function f (x1 , x2 ) = 4x12 + 12x1 x2 + 9x22 is convex over any subset of 2 since  y ∇ f (x)y = ( y1 T

2

y2 )

8 12

12 18



y1 y2



= 8y12 + 24y1 y2 + 18y22 = 2(2y1 + 3y2 )2 ≥ 0. Alternatively, it would have been possible to show that the eigenvalues of the Hessian matrix were all greater than or equal to zero. In the one-dimensional case, if a function satisfies f (x) > 0

for all x ∈ S,

then it is strictly convex on S. In the multidimensional case, if the Hessian matrix ∇ 2 f (x) is positive definite for all x ∈ S, then the function is strictly convex on S. This is not an “if and only if ” condition, since the Hessian of a strictly convex function need not be positive definite everywhere (see the Exercises). Now we consider another characterization of convexity that can be applied to functions that have one continuous derivative. In this case a function f is convex over a convex set S if and only if it satisfies f (y) ≥ f (x) + ∇f (x)T(y − x) for all x, y ∈ S. This property states that the function is on or above any of its tangents. (See Figure 2.6.) To prove this property, note that if f is convex, then for any x and y in S and for any 0 < α ≤ 1, f (αy + (1 − α)x) ≤ αf (y) + (1 − α)f (x), so that

f (x + α(y − x)) − f (x) ≤ f (y) − f (x). α

If we let α approach 0 from above, we can conclude that f (y) ≥ f (x) + ∇f (x)T(y − x).

i

i i

i

i

i

i

52

book 2008/10/23 page 52 i

Chapter 2. Fundamentals of Optimization

f (x)

x

Figure 2.6. Convex function with continuous first derivative. Conversely, suppose that the function f satisfies f (y) ≥ f (x) + ∇f (x)T(y − x) for all x and y in S. Let t = αx + (1 − α)y. Then t is also in the set S, so f (x) ≥ f (t) + ∇f (t)T(x − t) and f (y) ≥ f (t) + ∇f (t)T(y − t). Multiplying the two inequalities by α and 1 − α, respectively, and then adding yields the desired result. See the Exercises for details.

Exercises 3.1. Prove that the intersection of a finite number of convex sets is also a convex set. 3.2. Let S1 = { x : x1 + x2 ≤ 1, x1 ≥ 0 } and S2 = { x : x1 − x2 ≥ 0, x1 ≤ 1 }, and let S = S1 ∪ S2 . Prove that S1 and S2 are both convex sets but S is not a convex set. This shows that the union of convex sets is not necessarily convex. 3.3. Consider a feasible region S defined by a set of linear constraints S = { x : Ax ≤ b } . Prove that S is convex. 3.4. Prove that a function f is concave if and only if −f is convex. 3.5. Let f (x) be a function on n . Prove that f is both convex and concave if and only if f (x) = cTx for some constant vector c. 3.6. Prove that a convex combination of convex functions all defined on the same convex set S is also a convex function on S.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 53 i

53

3.7. Let f be a convex function on a convex set S ∈ n . Let k be a nonzero scalar, and define g(x) = kf (x). Prove that if k > 0, then g is a convex function on S, and if k < 0, then g is a concave function on S. 3.8. (Jensen’s Inequality.) Let f be a function on a convex set S ∈ n . Prove that f is convex if and only if   k k



αi x i ≤ αi f (xi ) f i=1

i=1

 for all x1 , . . . , xm ∈ S and 0 ≤ αi ≤ 1 where ki=1 αi = 1. 3.9. Prove the well-known inequality between the arithmetic mean and the geometric mean of a set of positive numbers: (x1 + · · · + xk )/k ≥ (x1 · · · xk )1/k . Hint: Apply the previous problem to the function f (x) = − log(x). p q 3.10. Consider the function f (x1 , x2 ) = αx1 x2 , defined on S = {x : x > 0}. For what values of α, p, and q is the function convex? Strictly convex? For what values is it concave? Strictly concave? 3.11. Consider the problem maximize f (x), x∈S

where S is a convex set and f is a concave function. Prove that any local maximizer is also a global maximizer. 3.12. Let g1 , . . . , gm be concave functions on n . Prove that the set S = { x : gi (x) ≥ 0, i = 1, . . . , m } is convex. 3.13. Let f be a convex function on the convex set S. Prove that the level set T = { x ∈ S : f (x) ≤ k } is convex for all real number k. 3.14. A function f is said to be quasi convex on the convex set S if every level set of f in S is convex, that is, if { x ∈ S : f (x) ≤ k } is convex for all k.

√ (i) Prove that f (x) = x is a quasi-convex function on S = x ∈ 1 , x ≥ 0 but it is not convex on S. (ii) Prove that f is quasi convex on a convex set S if and only if for every x and y in S and every 0 ≤ α ≤ 1, f (αx + (1 − α)x) ≤ max{f (x), f (y)}. (iii) Prove that any local minimizer of a quasi-convex function on a convex set is also a global minimizer.

i

i i

i

i

i

i

54

book 2008/10/23 page 54 i

Chapter 2. Fundamentals of Optimization

3.15. Let g1 , . . . , gm be concave functions on n . Prove that the set S = { x : gi (x) ≥ 0, i = 1, . . . , m }

3.16.

3.17. 3.18. 3.19.

is convex. Let f : n → 1 be a convex function, and let g : 1 → 1 be a convex nondecreasing function. (The notation f : n → 1 means that f is a real-valued function of n variables; g is a real-valued function of one variable.) Prove that the composite function h : n → 1 defined by h(x) = g(f (x)) is convex. Complete the proof of Theorem 2.1 for the case when the objective function is strictly convex. Express (2, 2)T as a convex combination of (0, 0)T, (1, 4)T, and (3, 1)T. For each of the following functions, determine if it is convex, concave, both, or neither on the real line. If the function is convex or concave, indicate if it is strictly convex or strictly concave. (i) (ii) (iii) (iv) (v) (vi) (vii)

f (x) = 3x 2 + 4x − 5 f (x) = exp(x 2 ) f (x) = 7x − 15 √ f (x) = 1 + x 2 f (x) = 4 − 5x + 3x 2 f (x) = 2x 4 + 3x 3 + 4x 2 f (x) = x/(1 + x 4 ).

3.20. Determine if f (x1 , x2 ) = 2x12 − 3x1 x2 + 5x22 − 2x1 + 6x2 is convex, concave, both, or neither for x ∈ 2 . 3.21. Give an example of a one-dimensional function f that is strictly convex on the real line even though f (x) ˆ = 0 at some point x. ˆ n 3.22. Let g1 , . . . , gm be concave functions on  , let f be a convex function on n , and let μ be a positive constant. Prove that the function β(x) = f (x) − μ

m

log gi (x)

i=1

is convex on the set S = { x : gi (x) > 0, i = 1, . . . , m }.

2.4 The General Optimization Algorithm More algorithms for solving optimization problems have been proposed than could possibly be discussed in a single book. This has happened in part because optimization problems can come in so many forms, but even for particular problems such as one-variable unconstrained minimization problems, there are many different algorithms that one could use.

i

i i

i

i

i

i

2.4. The General Optimization Algorithm

book 2008/10/23 page 55 i

55

Despite this diversity of both algorithms and problems, all of the algorithms that we will discuss in any detail in this book will have the same general form. Algorithm 2.1. General Optimization Algorithm I 1. Specify some initial guess of the solution x0 . 2. For k = 0, 1, . . . (i) If xk is optimal, stop. (ii) Determine xk+1 , a new estimate of the solution. This algorithm is so simple that it almost conveys no information at all. However, as we discuss ever more complex algorithms for ever more elaborate problems, it is often helpful to keep in mind that we are still working within this simple and general framework. The algorithm suggests that testing for optimality and determining a new point xk+1 are separate ideas, but this is usually not true. Often the information obtained from the optimality test is the basis for the computation of the new point. For example, if we are trying to solve the one-dimensional problem without constraints minimize f (x), then the optimality test will often be based on the condition f (x) = 0. If f (xk ) = 0, then xk is not optimal, and the sign and value of f (xk ) indicate whether f is increasing or decreasing at the point xk , as well as how rapidly f is changing. Such information is valuable in selecting xk+1 . Many of our algorithms will have a more specific form. Algorithm 2.2. General Optimization Algorithm II 1. Specify some initial guess of the solution x0 . 2. For k = 0, 1, . . . (i) If xk is optimal, stop. (ii) Determine a search direction pk . (iii) Determine a step length αk that leads to an improved estimate of the solution: xk+1 = xk + αk pk . In this algorithm, pk is a search direction that we hope points in the general direction of the solution, or that “improves” our solution in some sense. The scalar αk is a step length that determines the point xk+1 ; once the search direction pk has been computed, the step length αk is found by solving some auxiliary one-dimensional problem; see Figure 2.7.

i

i i

i

i

i

i

56

book 2008/10/23 page 56 i

Chapter 2. Fundamentals of Optimization

xk +1 = xk + α k pk

xk pk

Figure 2.7. General optimization algorithm. Why do we not just solve for the solution directly? Except for the simplest optimization problems, formulas for the solution do not exist. For example, consider the problem minimize f (x) = ex + x 2 . The optimality condition f (x) = 0 has the form ex + 2x = 0, but there is no simple formula for the solution to this equation. Hence for many problems some form of iterative method must be employed to determine a solution. (Any finite sequence of calculations is a formula of some sort, and so the solution of a general optimization problem can only be found as the limit of an infinite sequence. When we refer to computing a “solution” we most always mean an approximate solution, an element of this sequence that has sufficient accuracy. Determining the exact solution, or the limit of such a sequence, would be an “infinite” calculation.) Why do we split the computation of xk+1 into two calculations? Ideally we would like to have xk+1 = xk + pk where pk solves minimize f (xk + p), p

but this is equivalent to our original problem minimize f (x). x

Instead a compromise is employed. For an unconstrained problem of the form here, we will typically require that the search direction pk be a descent direction for the function f at the point xk . This means that for “small” steps taken along pk the function value is guaranteed to decrease: f (xk + αpk ) < f (xk ) for 0 < α ≤ 

i

i i

i

i

i

i

2.4. The General Optimization Algorithm

book 2008/10/23 page 57 i

57

f ( xk )

f ( xk + α k p k )

xk + α k p k xk pk

Figure 2.8. Line search. for some . For a linear function f (x) = cTx, pk is a descent direction if cT(xk + pk ) = cTxk + cTpk < cTxk , or in other words if cTpk < 0. Techniques for computing descent directions for nonlinear functions are discussed in Chapter 11. With pk available, we would ideally like to determine the step length αk so as to minimize the function in that direction: minimize f (xk + αpk ). α≥0

This is a problem only involving one variable, the parameter α. The restriction α ≥ 0 is imposed because pk is a descent direction. Even for this one-dimensional problem there may not be a simple formula for the solution, so it too cannot normally be solved exactly. Instead, an αk is computed that either “sufficiently decreases” the value of f or yields an “approximate minimizer” of the function f in the direction pk . Both these terms have precise theoretical meanings that will be specified in later chapters, and computational techniques are available that allow αk to be determined at reasonable cost. The calculation of αk is called a line search because it corresponds to a search along the line xk + αpk defined by α. The line search is illustrated in Figure 2.8. Algorithm II with its three major steps (the optimality test, computation of pk , and computation of αk ) has been the basis for a great many of the most successful optimization algorithms ever developed. It has been used to develop many software packages for nonlinear optimization, and it is also present implicitly as part of the simplex method for linear programming. It is not the only approach possible (see Section 11.6), but it is the approach that we will emphasize in this book.

i

i i

i

i

i

i

58

book 2008/10/23 page 58 i

Chapter 2. Fundamentals of Optimization

Using the concept of descent directions, we can establish an important condition for optimality for the constrained problem minimize f (x). x∈S

We define p to be a feasible descent direction at a point xk ∈ S if, for some  > 0, xk + αp ∈ S

and

f (xk + αp) < f (xk )

for all 0 < α ≤ . If a feasible descent direction exists at a point xk , then it is possible to move a short distance along this direction to a feasible point with a better objective value. Then xk cannot be a local minimizer for this problem. Hence, if x∗ is a local minimizer, there cannot exist any feasible descent directions at x∗ . This result will be used to derive optimality conditions for a variety of optimization problems.

Exercises 4.1. Let xk = (2, 1)T and pk = (−1, 3)T. Plot the set { x : x = xk + αpk , α ≥ 0 }. 4.2. Find all descent directions for the linear function f (x) = x1 − 2x2 + 3x3 . Does your answer depend on the value of x? 4.3. Consider the problem minimize subject to

f (x) = −x1 − x2 x1 + x2 ≤ 2 x1 , x2 ≥ 0.

(i) Determine the feasible directions at x = (0, 0)T, (0, 1)T, (1, 1)T, and (0, 2)T. (ii) Determine whether there exist feasible descent directions at these points, and hence determine which (if any) of the points can be local minimizers.

2.5

Rates of Convergence

Many of the algorithms discussed in this book do not find a solution in a finite number of steps. Instead these algorithms compute a sequence of approximate solutions that we hope get closer and closer to a solution. When discussing such an algorithm, the following two questions are often asked: • Does it converge? • How fast does it converge? It is the second question that is the topic of this section. If an algorithm converges in a finite number of steps, the cost of that algorithm is often measured by counting the number of steps required, or by counting the number of arithmetic operations required. For example, if Gaussian elimination is applied to a system

i

i i

i

i

i

i

2.5. Rates of Convergence

book 2008/10/23 page 59 i

59

of n linear equations, then it will require about n3 operations. This cost is referred to as the computational complexity of the algorithm. This concept is discussed in more detail in Chapter 9 in the context of linear programming. For many optimization methods, the number of operations or steps required to find an exact solution will be infinite, so some other measure of efficiency must be used. The rate of convergence is one such measure. It describes how quickly the estimates of the solution approach the exact solution. Let us assume that we have a sequence of points xk converging to a solution x∗ . We define the sequence of errors to be ek = xk − x∗ . Note that lim ek = 0.

k→∞

We say that the sequence { xk } converges to x∗ with rate r and rate constant C if lim

k→∞

ek+1  =C ek r

and C < ∞. To understand this idea better, let us look at some examples. Initially let us assume that we have ideal convergence behavior ek+1  = C ek r

for all k,

so that we can avoid having to deal with limits. When r = 1 this is referred to as linear convergence: ek+1  = C ek  . If 0 < C < 1, then the norm of the error is reduced by a constant factor at every iteration. If C > 1, then the sequence diverges. (What can happen when C = 1?) If we choose C = 0.1 = 10−1 and e0  = 1, then the norms of the errors are 1, 10−1 , 10−2 , 10−3 , 10−4 , 10−5 , 10−6 , 10−7 , and seven-digit accuracy is obtained in seven iterations, a good result. On the other hand, if C = 0.99, then the norms of the errors take on the values 1, 0.99, 0.9801, 0.9703, 0.9606, 0.9510, 0.9415, 0.9321, . . . , and it would take about 1600 iterations to reduce the error to 10−7 , a less impressive result. If r = 1 and C = 0, the convergence is called superlinear. Superlinear convergence includes all cases where r > 1 since if ek+1  = C < ∞, k→∞ ek r lim

then lim

k→∞

ek+1  ek+1  ek r−1 = C × lim ek r−1 = 0. = lim k→∞ ek r k→∞ ek 

i

i i

i

i

i

i

60

book 2008/10/23 page 60 i

Chapter 2. Fundamentals of Optimization

When r = 2, the convergence is called quadratic. As an example, let r = 2, C = 1, and e0  = 10−1 . Then the sequence of error norms is 10−1 , 10−2 , 10−4 , 10−8 , and so three iterations are sufficient to achieve seven-digit accuracy. In this form of quadratic convergence the error is squared at each iteration. Another way of saying this is that the number of correct digits in xk doubles at every iteration. Of course, if the constant C = 1, then this is not an accurate statement, but it gives an intuitive sense of the attractions of a quadratic convergence rate. For optimization algorithms there is one other important case, and that is when 1 < r < 2. This is another special case of superlinear convergence. This case is important because (a) it is qualitatively similar to quadratic convergence for the precision of common computer calculations, and (b) it can be achieved by algorithms that only compute first derivatives, whereas to achieve quadratic convergence it is often necessary to compute second derivatives as well. To get a sense of what this form of superlinear convergence looks like, let r = 1.5, C = 1, and e0  = 10−1 . Then the sequence of error norms is 1 × 10−1 , 3 × 10−2 , 6 × 10−3 , 4 × 10−4 , 9 × 10−6 , 3 × 10−8 , and five iterations are required to achieve single-precision accuracy. Example 2.2 (Rate of Convergence of a Sequence). Consider the sequence 2, 1.1, 1.01, 1.001, 1.0001, 1.00001, . . . with general term xk = 1 + 10−k . This sequence converges to x∗ = 1 and ek = xk − x∗ = 10−k . Hence ek+1  10−(k+1) 1 = , lim = lim −k k→∞ ek  k→∞ 10 10 so that the sequence converges linearly with rate constant Now consider the sequence

1 . 10

4, 2.5, 2.05, 2.00060975, . . . defined by the formula xk+1 =

  xk 1 4 2 = xk + + 2 xk 2 xk

with x0 = 4. It can be shown that xk → 2. Also ek+1 = xk+1 − x∗ xk 2 = + −2 2 xk 1 (x 2 + 4 − 4xk ) = 2xk k 1 2 1 (xk − 2)2 = e . = 2xk 2xk k

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 61 i

61

From this it follows that lim

k→∞

ek+1  1 1 = = . 2 2|x∗ | 4 ek 

Hence this sequence converges quadratically with rate constant 14 . In practical situations ideal convergence behavior is not always observed. The rate of convergence is only observed in the limit, so at the initial iterations there is no guarantee that the norm of the error will be reduced at all, let alone at any predictable rate. In fact, it is not uncommon for an algorithm to expend almost all of its effort far from the solution, with this asymptotic convergence rate only becoming apparent at the last few iterations. In addition, the algorithm will be terminated after a finite number of iterations when the error in the solution is below some tolerance, and so the limiting behavior described here may be only imperfectly observed. There is ambiguity in the definition of the rate of convergence. For instance, any sequence that converges quadratically also converges linearly, but with rate constant equal to zero. It is common when discussing algorithms to refer to the fastest rate at which the algorithm typically converges. For example, in Section 2.7 we show that a certain sequence { xk } satisfies   f (x∗ ) xk+1 − x∗ ≈ (xk − x∗ )2 , 2f (x∗ ) where x∗ = lim xk and f is a function used to define the sequence. Based on this formula, the sequence { xk } is said to converge quadratically. However, if f (x∗ ) = 0 the right-hand side is not defined. On the other hand, if f (x∗ ) = 0 but f (x∗ ) = 0, then the sequence can converge faster than quadratically. “Typically” these things do not happen. In many situations people use a sort of shorthand and only refer to the convergence rate without mention of the rate constant. For quadratic rates of convergence this is not too misleading, since the ideal behavior and the observed behavior are similar unless the rate constant is exceptionally large or small. However, in the linear case the rate constant plays an important role. It is not uncommon to see rate constants that are close to one, and more unusual to see rate constants near zero. As a result, linear convergence rates are often considered to be inferior. However, if the rate constant is small, then there is little practical difference between linear and higher rates of convergence at the level of precision common on many computers. In summary, even though it is generally true that higher rates of convergence often represent improvements in performance, this is not guaranteed, and an algorithm with a linear rate of convergence can sometimes be effective in a practical setting.

Exercises 5.1. For each of the following sequences, prove that the sequence converges, find its limit, and determine the rate of convergence and the rate constant.

i

i i

i

i

i

i

62

book 2008/10/23 page 62 i

Chapter 2. Fundamentals of Optimization (i) The sequence 1 1 1 1 , , , , 1 ,... 2 4 8 16 32

with general term xk = 2−k , for k = 1, 2, . . . . (ii) The sequence 1.05, 1.0005, 1.000005, . . . with general term xk = 1 + 5 × 10−2k , for k = 1, 2, . . . . k (iii) The sequence with general term xk = 2−2 . 2 (iv) The sequence with general term xk = 3−k . k (v) The sequence with general term xk = 1 − 2−2 for k odd, and xk = 1 + 2−k for k even. 5.2. Consider the sequence defined by x0 = a > 0 and   a 1 xk+1 = 2 xk + . xk √ Prove that this sequence converges to x∗ = a and that the convergence rate is quadratic, and determine the rate constant. 5.3. Consider a convergent sequence { xk } and define a second sequence { yk } with yk = cxk where c is some nonzero constant. What is the relationship between the convergence rates and rate constants of the two sequences? 5.4. Let { xk } and { ck } be convergent sequences, and assume that lim ck = c = 0.

k→∞

Consider the sequence { yk } with yk = ck xk . Is this sequence guaranteed to converge? If so, can its convergence rate and rate constant be determined from the rates and rate constants for the sequences { xk } and { ck }?

2.6 Taylor Series The Taylor series is a tool for approximating a function f near a specified point x0 . The approximation obtained is a polynomial, i.e., a function that is easy to manipulate. The Taylor series is a general tool—it can be applied whenever the function has derivatives— and it has many uses: • It allows you to estimate the value of the function near the given point (when the function is difficult to evaluate directly). • The derivatives and integral of the approximation can be used to estimate the derivatives and integral of the original function. • It is used to derive many algorithms for finding zeroes of functions (see below), for minimizing functions, etc.

i

i i

i

i

i

i

2.6. Taylor Series

book 2008/10/23 page 63 i

63

Since many problems are difficult to solve exactly, and an approximate solution is often adequate (the data for the problem may be inaccurate), the Taylor series is widely used, both theoretically and practically. Even if the data are exact, an approximate solution may be adequate, and in any case it is all we can hope for under most circumstances. How does it work? We first consider the case of a one-dimensional function f with n continuous derivatives. Let x0 be a specified point (say x0 = 17.5 or x0 = 0). Then the nth order Taylor series approximation is 1 p n (n) f (x0 + p) ≈ f (x0 ) + pf (x0 ) + p 2 f (x0 ) + · · · + f (x0 ). 2 n! Here f (n) (x0 ) is the nth derivative of f at the point x0 , and n! = n(n − 1)(n − 2) · · · 3 · 2 · 1. Notice that 12 p 2 f (x0 ) = (p2 /2!)f (2) (x0 ). In this formula, p is a variable; we will decide later what values p will take. The approximation will normally only be accurate for small values of p. √ Example 2.3 (Taylor Series). Let f (x) = x and let x0 = 1. Then √ √ f (x0 ) = x0 = 1 = 1 −

f (x0 ) = 12 x0

1 2 −

f (x0 ) = − 14 x0 −

f (x0 ) = 38 x0 .. .

5 2

1

= 12 1− 2 = 3 2

1 2

3

= − 14 1− 2 = − 14 5

= 38 1− 2 =

3 8

Hence, substituting into the formula for the Taylor series, 1 + p = f (x0 + p) ≈ f (x0 ) + pf (x0 ) + 12 p 2 f (x0 ) + 16 p 3 f (x0 ) = 1 + p( 12 ) + 12 p 2 (− 14 ) + 16 p 3 ( 38 ) = 1 + 12 p − 18 p 2 +

1 3 p . 16

How do we use this? Suppose we want to approximate f (1.6). Then x0 + p = 1 + p = 1.6, and so p = 0.6: √ √ 1.6 = 1 + 0.6 1 (0.6)3 ≈ 1.2685. ≈ 1 + 12 (0.6) − 18 (0.6)2 + 16 The true value is 1.264911 . . . ; the approximation is accurate to three digits. The first two terms of the Taylor series give us the formula for the tangent line for the function f at the point x0 . We commonly define the tangent line in terms of a general point x, and not in terms of p. Since x0 + p = x, we can rearrange to get p = x − x0 . Substitute this into the first two terms of the series to get the tangent line: y = f (x0 ) + (x − x0 )f (x0 ).

i

i i

i

i

i

i

64

book 2008/10/23 page 64 i

Chapter 2. Fundamentals of Optimization 2.5

2

f (x )=√x

1.5

1

quadratic approximation 1⫹(x⫺1)/2 ⫺(x⫺1)2/8 0.5

0

0

1

2

3

4

5

x

6

Figure 2.9. Taylor series approximation. For the example above we get y = 1 + (x − 1) 12

or

y = 12 (x + 1).

The first three terms of the Taylor series give a quadratic approximation to the function f at the point x0 . This is illustrated in Figure 2.9. So far we have only considered a Taylor series for a function of one variable. The Taylor series can also be derived for real-valued functions of many variables. If we use matrix and vector notation, then there is an obvious analogy between the two cases: 1-variable: f (x0 + p) = f (x0 ) + pf (x0 ) + 12 p 2 f (x0 ) + · · · n-variables: f (x0 + p) = f (x0 ) + p T∇f (x0 ) + 12 p T∇ 2 f (x0 )p + · · · . In the second line above x0 and p are both vectors. The notation ∇f (x0 ) refers to the gradient of the function f at the point x = x0 . The notation ∇ 2 f (x0 ) represents the Hessian of f at the point x = x0 . (See Appendix B.4.) The higher-order terms of the Taylor series can also be written down, but the notation is more complex and they will not be required in this book. Example 2.4 (Multidimensional Taylor Series). Consider the function f (x1 , x2 ) = x13 + 5x12 x2 + 7x1 x22 + 2x23 at the point x0 = (−2, 3)T. The gradient of this function is  ∇f (x) = and the Hessian matrix is ∇ 2 f (x) =



3x12 + 10x1 x2 + 7x22



5x12 + 14x1 x2 + 6x22

6x1 + 10x2 10x1 + 14x2

10x1 + 14x2 14x1 + 12x2

 .

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 65 i

65

At the point x0 = (−2, 3)T these become   15 and ∇f (x0 ) = −10

 ∇ f (x0 ) = 2

18 22

22 8

 .

If p = (p1 , p2 )T = (0.1, 0.2)T, then f (−1.9, 3.2) = f (−2 + 0.1, 3 + 0.2) = f (x0 + p) 1 ≈ f (x0 ) + p T∇f (x0 ) + p T∇ 2 f (x0 )p  2  1 15 + ( 0.1 = −20 + ( 0.1 0.2 ) −10 2 = −20 − 0.5 + 0.69 = −19.81.

 0.2 )

18 22

22 8



0.1 0.2



The true value is f (−1.9, 3.2) = −19.755, so the approximation is accurate to three digits. The Taylor series for multidimensional problems can also be derived using summations rather than matrix-vector notation: n n n

∂f (x)  ∂ 2 f (x)  1

pi + pi pj + ···. f (x0 + p) = f (x0 ) +   ∂xi x=x0 2 i=1 j =1 ∂xi ∂xj x=x0 i=1 The formula is the same as before; only the notation has changed. There is an alternate form of the Taylor series that is often used, called the remainder form. If three terms are used it looks like 1-variable: f (x0 + p) = f (x0 ) + pf (x0 ) + 12 p 2 f (ξ ) n-variables: f (x0 + p) = f (x0 ) + p T∇f (x0 ) + 12 p T∇ 2 f (ξ )p. The point ξ is an unknown point lying between x0 and x0 + p. In this form the series is exact, but it involves an unknown point, so it cannot be evaluated. This form of the series is often used for theoretical purposes, or to derive bounds on the accuracy of the series. The accuracy of the series can be analyzed by establishing bounds on the final “remainder” term. If the remainder form of the series is used, but with only two terms, then we obtain 1-variable: f (x0 + p) = f (x0 ) + pf (ξ ) n-variables: f (x0 + p) = f (x0 ) + p T∇f (ξ ). This result is known as the mean-value theorem.

Exercises 6.1. Find the first four terms of the Taylor series for f (x) = log(1 + x)

i

i i

i

i

i

i

66

book 2008/10/23 page 66 i

Chapter 2. Fundamentals of Optimization

about the point x0 = 0. Evaluate the series for p = 0.1 and p = 0.01 and compare with the value of f (x0 +p). Derive the remainder form of the Taylor series using five terms (the four terms you already derived plus a remainder term). Derive a bound on the accuracy of the four-term series. Compare the bound you derived with the actual errors for p = 0.1 and p = 0.01. 6.2. Find the first three terms of the Taylor series for the following functions. (i) f (x) = sin x about the point x0 = π . (ii) f (x) = 2/(3x + 5) about the point x0 = −1. (iii) f (x) = ex about the point x0 = 0. 6.3. Determine the general term in the Taylor series for the function  e−1/x if x > 0, f (x) = 0 if x ≤ 0, about the point x0 = 0. Compare this with the Taylor series for the function f (x) = 0 about the same point. What can you conclude about the limitations of the Taylor series as a tool for approximating functions? 6.4. Find the first three terms of the Taylor series for f (x1 , x2 ) = 3x14 − 2x13 x2 − 4x12 x22 + 5x1 x23 + 2x24 at the point x0 = (1, −1)T. Evaluate the series for p = (0.1, 0.01)T and compare with the value of f (x0 + p). 6.5. Find the first three terms of the Taylor series for  f (x1 , x2 ) = x12 + x22 about the point x0 = (3, 4)T. 6.6. Prove that if pT∇f (xk ) < 0, then f (xk + p) < f (xk ) for  > 0 sufficiently small. Hint: Expand f (xk + p) in a Taylor series about the point xk and look at f (xk + p) − f (xk ). 6.7. (The results of this and the next problem show that a function f is convex on a convex set S if the Hessian matrix ∇ 2 f (x) is positive semidefinite for all x ∈ S.) Let f be a real-valued function of n variables x with continuous first derivatives. Prove that f is convex on the convex set S if and only if f (y) ≥ f (x) + ∇f (x)T(y − x) for all x, y ∈ S. 6.8. Let f be a real-valued function of n variables x with continuous second derivatives. Use the result of the previous problem to prove that f is convex on the convex set S if ∇ 2 f (x) is positive semidefinite for all x ∈ S.

i

i i

i

i

i

i

2.7. Newton’s Method for Nonlinear Equations

2.7

book 2008/10/23 page 67 i

67

Newton’s Method for Nonlinear Equations

Let us now consider methods for solving f (x) = 0. We first consider the one-dimensional case where x is a scalar and f is a real-valued function. Later we will look at the n-dimensional case where x = (x1 , . . . , xn )T and f (x) = (f1 (x), . . . , fn (x))T. Note that both x and f (x) are vectors of the same length n. Throughout this section we assume that the function f has two continuous derivatives. If f (x) is a linear function, it is possible to find a solution if the system is nonsingular. The cost of finding the solution is predictable—it is the cost of applying Gaussian elimination. Except for a few isolated special cases, such as quadratic equations in one variable, in the nonlinear case it is not possible to guarantee that a solution can be found, nor is it possible to predict the cost of finding a solution. However, the situation is not totally bleak. There are effective algorithms that work much of the time, and that are efficient on a wide variety of problems. They are based on solving a sequence of linear equations. As a result, if the function f is linear, they can be as efficient as the techniques for linear systems. Also, we can apply our knowledge about linear systems in the nonlinear case. The methods that we will discuss are based on Newton’s method. Given an estimate of the solution xk , the function f is approximated by the linear function consisting of the first two terms of the Taylor series for the function f at the point xk . The resulting linear system is then solved to obtain a new estimate of the solution xk+1 . To derive the formulas for Newton’s method, we first write out the Taylor series for the function f at the point xk : f (xk + p) ≈ f (xk ) + pf (xk ). If f (xk ) = 0, then we can solve the equation f (x∗ ) ≈ f (xk ) + pf (xk ) = 0 for p to obtain

p = −f (xk )/f (xk ).

The new estimate of the solution is then xk+1 = xk + p or xk+1 = xk − f (xk )/f (xk ). This is the formula for Newton’s method. Example 2.5 (Newton’s Method). As an example, consider the one-dimensional problem f (x) = 7x 4 + 3x 3 + 2x 2 + 9x + 4 = 0. Then

f (x) = 28x 3 + 9x 2 + 4x + 9

and the formula for Newton’s method is xk+1 = xk −

7xk4 + 3xk3 + 2xk2 + 9xk + 4 . 28xk3 + 9xk2 + 4xk + 9

i

i i

i

i

i

i

68

book 2008/10/23 page 68 i

Chapter 2. Fundamentals of Optimization

Table 2.1. Newton’s method for a one-dimensional problem. xk

f (xk )

|xk − x∗ |

0 −0.4444444444444444 −0.5063255748934088 −0.5110092428604380 −0.5110417864454134 −0.5110417880368663

4 × 10 4 × 10−1 3 × 10−2 2 × 10−4 9 × 10−9 0

5 × 10−1 7 × 10−2 5 × 10−3 3 × 10−5 2 × 10−9 0

k 0 1 2 3 4 5

0

If we start with the initial guess x0 = 0, then x1 = x0 −

7x04 + 3x03 + 2x02 + 9x0 + 4 28x03 + 9x02 + 4x0 + 9

7 × 0 4 + 3 × 03 + 2 × 02 + 9 × 0 + 4 28 × 03 + 9 × 02 + 4 × 0 + 9 4 = 0 − = −4/9 = −0.4444 . . . . 9 =0−

At the next iteration we substitute x1 = −4/9 into the formula for Newton’s method and obtain x2 ≈ −0.5063. The complete iteration is given in Table 2.1. Newton’s method corresponds to approximating the function f by its tangent line at the point xk . The point where the tangent line crosses the x-axis (i.e., a zero of the tangent line) is taken as the new estimate of the solution. This geometric interpretation is illustrated in Figure 2.10. The performance of Newton’s method in Example 2.5 is considered to be typical for this method. It converges rapidly and, once xk is close to the solution x∗ , the error is approximately squared at every iteration. It has a quadratic rate of convergence as we now show. It is not difficult to analyze the convergence of Newton’s method using the Taylor series. Define the error in xk by ek = xk − x∗ . Using the remainder form of the Taylor series: 0 = f (x∗ ) = f (xk − ek ) = f (xk ) − ek f (xk ) + 12 ek2 f (ξ ). Dividing by f (xk ) and rearranging gives ek −

f (xk ) 1 2 f (ξ ) = e . f (xk ) 2 k f (xk )

Since ek = xk − x∗ we obtain xk −

f (ξ ) f (xk ) 1 − x∗ = (xk − x∗ )2 , f (xk ) 2 f (xk )

i

i i

i

i

i

i

2.7. Newton’s Method for Nonlinear Equations

book 2008/10/23 page 69 i

69

f ( x) = 0 x2

x1

x0

Figure 2.10. Newton’s method—geometric interpretation. which is the same as xk+1 − x∗ =

f (ξ ) 1 (xk − x∗ )2 . 2 f (xk )

If the sequence { xk } converges, then ξ → x∗ , and hence when xk is sufficiently close to x∗ ,   1 f (x∗ ) xk+1 − x∗ ≈ (xk − x∗ )2 2 f (x∗ ) indicating that the error in xk is approximately squared at every iteration, assuming that the rate constant 12 f (x∗ )/f (x∗ ) is not ridiculously large or small. These results are summarized in the following theorem. Theorem 2.6 (Convergence of Newton’s Method). Assume that the function f (x) has two continuous derivatives. Let x∗ be a zero of f with f (x∗ ) = 0. If |x0 − x∗ | is sufficiently small, then the sequence defined by xk+1 = xk − f (xk )/f (xk ) converges quadratically to x∗ with rate constant C = |f (x∗ )/2f (x∗ )|. Proof. See the Exercises. Example 2.5 also shows that the function values f (xk ) converge quadratically to zero. This also follows from the Taylor series: 0 = f (x∗ ) = f (xk + ek ) = f (xk ) + ek f (ξ ).

i

i i

i

i

i

i

70

book 2008/10/23 page 70 i

Chapter 2. Fundamentals of Optimization

This can be rearranged to obtain f (xk ) = −ek f (ξ ) = −f (ξ )(x∗ − xk ) rate if f (x∗ ) = 0. so that f (xk ) is proportional to (x∗ −xk ). Hence they converge

at the same In the argument above we have assumed that f (xk ) and f (x∗ ) are all nonzero. If f (xk ) = 0 for some k, then Newton’s method fails (there is a division by zero in the formula). Geometrically this means that the tangent line is horizontal, parallel to the x-axis, and so it does not have a zero. If on the other hand f (xk ) = 0 for all k, f (x∗ ) = 0, but f (x∗ ) = 0, then the coefficient in the convergence analysis f (ξ ) 2f (xk ) tends to infinity, and the algorithm does not have a quadratic rate of convergence. If f is a polynomial, this corresponds to f having a multiple zero at the point x∗ ; this case is illustrated in Example 2.7. Example 2.7 (Newton’s Method; f (x∗ ) = 0). We now apply Newton’s method to the example f (x) = x 4 − 7x 3 + 17x 2 − 17x + 6 = (x − 1)2 (x − 2)(x − 3) = 0. This function has a multiple zero at x∗ = 1 and at this point f (x∗ ) = f (x∗ ) = 0. The derivative of f is f (x) = 4x 3 − 21x 2 + 34x − 17 and the formula for Newton’s method is xk+1 = xk −

x 4 − 7x 3 + 17x 2 − 17x + 6 . 4x 3 − 21x 2 + 34x − 17

If we start with the initial guess x0 = 1.1, then the method converges to x∗ = 1 at a linear rate, whereas if we start with x0 = 2.1, then the method converges to x∗ = 2 at a quadratic rate. The results for these iterations are given in Tables 2.2 and 2.3. (In the final lines of both tables the function value f (xk ) is zero; this is the value calculated by the computer and is a side effect of using finite-precision arithmetic.) In Example 2.7 the slow convergence only occurs when the method converges to a solution where f (x∗ ) = 0. Quadratic convergence is obtained at the other roots, where f (x∗ ) = 0. It should also be noticed that the accuracy of the solution was worse at a multiple root. This too can be explained by the Taylor series, although this time we expand about the point x∗ : f (xk ) = f (x∗ + ek ) = f (x∗ ) + ek f (x∗ ) + 12 ek2 f (ξ ). At the solution, f (x∗ ) = 0, and since this is assumed to be a multiple zero, f (x∗ ) = 0 as well. Hence f (xk ) = 12 ek2 f (ξ ) = ( 12 f (ξ ))(xk − x∗ )2 .

i

i i

i

i

i

i

2.7. Newton’s Method for Nonlinear Equations

book 2008/10/23 page 71 i

71

Table 2.2. Newton’s method: f (x∗ ) = 0 (x0 = 1.1). k

xk

f (xk )

0 1 2 3 4 5 6 7 8 9 10

1.100000000000000 1.045541401273894 1.021932395992710 1.010779316995807 1.005345328998912 1.002661858321646 1.001328260855184 1.000663467429195 1.000331568468827 1.000165742989413 1.000082861192927 .. .

24 25

1.000000075780004 1.000000040618541

−2

|xk − x∗ |

2 × 10 4 × 10−3 9 × 10−4 2 × 10−4 6 × 10−5 1 × 10−5 4 × 10−6 9 × 10−7 2 × 10−7 6 × 10−8 1 × 10−8

1 × 10−1 5 × 10−2 2 × 10−2 1 × 10−2 5 × 10−3 3 × 10−3 1 × 10−3 7 × 10−4 3 × 10−4 2 × 10−4 8 × 10−5

1 × 10−14 0

8 × 10−8 4 × 10−8

Table 2.3. Newton’s method: f (x∗ ) = 0 (x0 = 2.1). k 0 1 2 3 4

xk

|xk − x∗ |

f (xk )

2.100000000000000 2.006603773584894 2.000042472785593 2.000000001803635 2.000000000000001

−1

−1 × 10 −7 × 10−3 −4 × 10−5 −2 × 10−9 0

1 × 10−1 7 × 10−3 4 × 10−5 2 × 10−9 9 × 10−16

The function value f (xk ) is now proportional to the square of the error (xk − x∗ ). So, for example, if f (xk ) = 10−16 (about the level of machine precision in typical double precision arithmetic), and 12 f (ξ ) = 1, then xk − x∗ = 10−8 . In this case the point xk is only accurate to half precision. The proof of convergence for Newton’s method requires that the initial point x0 be sufficiently close to a zero. If not, the method can fail to converge, even when there is no division by zero in the formula for the method. This is illustrated in the example below. In Chapter 11 we discuss safeguards that can be added to Newton’s method that prevent this from happening. Example 2.8 (Failure of Newton’s Method). Consider the problem f (x) =

ex − e−x = 0. ex + e−x

i

i i

i

i

i

i

72

book 2008/10/23 page 72 i

Chapter 2. Fundamentals of Optimization

x3

x1

0 x0

x2

Figure 2.11. Failure of Newton’s method. If Newton’s method is used with the initial guess x0 = 1, then the sequence of approximate solutions is x0 = 1, x1 = −0.8134, x2 = 0.4094 x3 = −0.0473, x4 = 7.06 × 10−5 , x5 = −2.35 × 10−13 and at the final point f (x5 ) = −2.35 × 10−13 , so the method converges to a solution. However if x0 = 1.1, then x0 = 1.1, x3 = −1.6952,

x1 = −1.1286, x2 = 1.2341 x4 = 5.7154, x5 = −2.30 × 104

and at the next iteration an overflow results. At the final point f (x5 ) = 1, so the sequence is not converging to a solution. A graph of the function is given in Figure 2.11. This function is also called the hyperbolic tangent function, f (x) = tanh x.

2.7.1

Systems of Nonlinear Equations

Much of the discussion in the one-dimensional case can be transferred with only minor changes to the n-dimensional case. Suppose now that we are solving f (x) = 0, where this represents f1 (x1 , . . . , xn ) = 0, f2 (x1 , . . . , xn ) = 0, .. . fn (x1 , . . . , xn ) = 0.

i

i i

i

i

i

i

2.7. Newton’s Method for Nonlinear Equations

book 2008/10/23 page 73 i

73

Define the matrix ∇f (x) with columns ∇f1 (x), . . . , ∇fn (x). This is the transpose of the Jacobian of f at the point x. (The Jacobian is discussed in Appendix B.4.) As before, we write out the Taylor series approximation for the function f at the point xk : f (xk + p) ≈ f (xk ) + ∇f (xk )Tp, where p is now a vector. Now we solve the equation f (x∗ ) ≈ f (xk ) + ∇f (xk )Tp = 0 for p to obtain

p = −∇f (xk )−T f (xk ).

The new estimate of the solution is then xk+1 = xk + p = xk − ∇f (xk )−T f (xk ). This is the formula for Newton’s method in the n-dimensional case. Example 2.9 (Newton’s Method in n Dimensions). As an example, consider the twodimensional problem f1 (x1 , x2 ) = 3x1 x2 + 7x1 + 2x2 − 3 = 0, f2 (x1 , x2 ) = 5x1 x2 − 9x1 − 4x2 + 6 = 0. 

Then ∇f (x1 , x2 ) =

3x2 + 7 3x1 + 2

5x2 − 9 5x1 − 4

 ,

and the formula for Newton’s method is −T    3x1 x2 + 7x1 + 2x2 − 3 3x2 + 7 5x2 − 9 . xk+1 = xk − 3x1 + 2 5x1 − 4 5x1 x2 − 9x1 − 4x2 + 6 If we start with the initial guess x0 = (1, 2)T, then −T   3x1 x2 + 7x1 + 2x2 − 3 3x2 + 7 5x2 − 9 x1 = x0 − 3x1 + 2 5x1 − 4 5x1 x2 − 9x1 − 4x2 + 6 −T      13 1 1 14 − = 5 1 2 −1       −1.375 2.375 1 . = − = 5.375 −3.375 2 

The complete iteration is given in Table 2.4. In the n-dimensional case, Newton’s method corresponds to approximating the function f by a linear function at the point xk . The zero of this linear approximation is the new estimate xk+1 . As in the one-dimensional case, the method typically converges with a

i

i i

i

i

i

i

74

book 2008/10/23 page 74 i

Chapter 2. Fundamentals of Optimization

Table 2.4. Newton’s method for an n-dimensional problem. k

x1k

x2k

f 2

x − x∗ 2

0 1 2 3 4 5 6 7 8

1.0000000 × 100 −1.3749996 × 100 −5.4903371 × 10−1 −1.6824928 × 10−1 −2.7482068 × 10−2 −1.0090199 × 10−3 −1.4637396 × 10−6 −3.0852447 × 10−12 −2.0216738 × 10−18

2.0000000 5.3749991 3.0472771 1.9741571 1.5774495 1.5028436 1.5000041 1.5000000 1.5000000

1 × 101 5 × 101 1 × 101 2 × 100 3 × 10−1 1 × 10−2 2 × 10−5 4 × 10−11 0

1 × 100 4 × 100 2 × 100 5 × 10−1 8 × 10−2 3 × 10−3 4 × 10−6 9 × 10−12 2 × 10−18

quadratic rate of convergence, as the theorem below indicates. A proof of quadratic convergence for Newton’s method can be found in the book by Ortega and Rheinboldt (1970, reprinted 2000). Theorem 2.10 (Convergence of Newton’s Method in n Dimensions). Assume that the function f (x) has two continuous derivatives. Assume that x∗ satisfies f (x∗ ) = 0 with ∇f (x∗ ) nonsingular. If x0 − x∗  is sufficiently small, then the sequence defined by xk+1 = xk − (∇f (xk ))−1 f (xk ) converges quadratically to x∗ . Our discussion has implicitly assumed that every Jacobian matrix ∇f (xk )T is nonsingular, that is, the system of linear equations that defines the new point xk+1 has a unique solution. If this assumption is not satisfied, Newton’s method fails. If the Jacobian matrix at the solution ∇f (x∗ )T is singular, then there is no guarantee of quadratic convergence. The proof of convergence assumes that xk is “sufficiently close” to x∗ , as in the one-dimensional case. If it is not, the method can diverge.

Exercises 7.1. Apply Newton’s method to find all three solutions of f (x) = x 3 − 5x 2 − 12x + 19 = 0. You will have to use several different initial guesses. 7.2. Let a be some positive constant. It is possible to use Newton’s method to calculate 1/a to any desired accuracy without doing division. Determine a function f such that f (1/a) = 0, and for which the formula for Newton’s method only uses the

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 75 i

75

arithmetic operations of addition, subtraction, and multiplication. For what initial values does Newton’s method converge for this function? 7.3. Apply Newton’s method to f (x) = (x − 2)4 + (x − 2)5 with initial guess x0 = 3. You should observe that the sequence converges linearly with rate constant 34 . Now apply the iterative method xk+1 = xk − 4f (xk )/f (xk ). This method should converge more rapidly for this problem. Prove that the new method converges quadratically, and determine the rate constant. 7.4. A function f has a root of multiplicity m > 1 at the point x∗ if f (x∗ ) = f (x∗ ) = · · · = f (m−1) (x∗ ) = 0. Assume that Newton’s method with initial guess x0 converges to such a root. Prove that Newton’s method converges linearly but not quadratically. Assume that the iteration xk+1 = xk − mf (xk )/f (xk ) 7.5.

7.6. 7.7.

7.8.

7.9. 7.10.

converges to x∗ . If f (m) (x∗ ) = 0, prove that this sequence converges quadratically. Apply Newton’s method to solve f (x) = x 2 − a = 0, where a > 0. This is a good √ way to compute ± a. How does the iteration behave if a ≤ 0? What happens if you choose x0 as a complex number? Prove that your iteration from the previous √ problem converges to a root if√x0 = 0. When does the iteration converge to + a and when does it converge to − a? For the iteration in the previous problem, can you efficiently determine a good initial guess x0 using the value of a and the elementary operations of addition, subtraction, multiplication, and division? Can you determine an upper bound on how many elementary operations are required to determine a root to within a specified accuracy? Newton’s method was derived by approximating the general function f by the first two terms of its Taylor series at the current point xk . Derive another method for finding zeroes by approximating f with the first three terms of its Taylor series at the current point, and finding a zero of this approximation. Determine the rate of convergence for this new method (you may assume that the method converges). Apply the method to the functions in Examples 2.5 and 2.7. Prove Theorem 2.10. Apply Newton’s method to the system of nonlinear equations f1 (x1 , x2 ) = x12 + x22 − 1 = 0 f2 (x1 , x2 ) = 5x12 − x2 − 2 = 0. There are four solutions to this system of equations. Can you find all four of them by using different initial guesses?

i

i i

i

i

i

i

76

book 2008/10/23 page 76 i

Chapter 2. Fundamentals of Optimization

7.11. (Extended Project) Apply Newton’s method to solve f (x) = x n − a = 0 for various values of n. Experiment with the method in an attempt to understand its properties. Under what circumstances will the method converge to a root? Can you, by using complex-valued initial guesses, determine all n roots of this equation? What can you prove about the convergence of the iteration? What happens if n is not an integer? 7.12. Suppose that Newton’s method is applied to a system of nonlinear equations, where some of the equations are linear. Prove that the linear equations are satisfied at every iteration, except possibly at the initial point.

2.8

Notes

Global Optimization—Techniques for global optimization are discussed in the books by Hansen (1992) and Floudas and Pardalos (1992, reprinted 2007); Hansen and Walster (2003); Horst et al. (2000); and Liberti and Maculan (2006). A survey of results can be found in article by Rinnooy Kan and Timmer (1989). Newton’s Method—If a function is known to have a multiple root, and if the multiplicity of the root is known (e.g., if it is known to be a double root), then it is possible to adjust the formula for Newton’s method to restore the quadratic rate of convergence. (See the Exercises above.) However, on a general problem it is unlikely that this information will be available, so this is not normally a practical alternative.

i

i i

i

i

i

i

book 2008/10/23 page 77 i

Chapter 3

Representation of Linear Constraints

3.1

Basic Concepts

In this chapter we examine ways of representing linear constraints. The goal is to write the constraints in a form that makes it easy to move from one feasible point to another. The constraints specify interrelationships among the variables so that, for example, if we increase the first variable, retaining feasibility might require making a complicated sequence of changes to all the other variables. It is much easier if we express the constraints using a coordinate system that is “natural” for the constraints. Then the interrelationships among the variables are taken care of by the coordinate system, and moves between feasible points are almost as simple as for a problem without constraints. In the general case these constraints may be either equalities or inequalities. Since any inequality of the “less than or equal” type may be transformed to an equivalent constraint of the “greater or equal” type, any problem with linear constraints may be written as follows: minimize subject to

f (x) aiTx = bi , i ∈ E aiTx ≥ bi , i ∈ I.

Each ai here is a vector of length n and each bi is a scalar. E is an index set for the equality constraints and I is an index set for the inequality constraints. We denote by A the matrix whose rows are the vectors aiT and denote by b the vector of right-hand side coefficients bi . Let S be the set of feasible points. A set of this form, defined by a finite number of linear constraints, is sometimes called a polyhedron or a polyhedral set. In this chapter we are not concerned with the properties of the objective function f . Example 3.1 (Problem with Linear Constraints). Consider the problem minimize subject to

f (x) = x12 + x23 x34 x1 + 2x2 + 3x3 = 6 x1 , x2 , x3 ≥ 0. 77

i

i i

i

i

i

i

78

book 2008/10/23 page 78 i

Chapter 3. Representation of Linear Constraints

Figure 3.1. Feasible directions. For this example E = { 1 } and I = { 2, 3, 4 }. The vectors { ai } that determine the constraints are a1 = ( 1 2 3 )T , a2 = ( 1 0 0 )T a3 = ( 0 1 0 )T , a4 = ( 0 0 1 )T and the right-hand sides are b1 = 6,

b2 = 0,

b3 = 0,

and

b4 = 0.

We start by taking a closer look at the relation between a feasible point and its neighboring feasible points. We shall be interested in determining how the function value changes as we move from a feasible point x¯ to nearby feasible points. First let us look at the direction of movement. We define p to be a feasible direction at the point x¯ if a small step taken along p leads to a feasible point in the set. Mathematically, p is a feasible direction if there exists some  > 0 such that x¯ + αp ∈ S for all 0 ≤ α ≤ . Thus, a small movement from x¯ along a feasible direction maintains feasibility. In addition, since the feasible set is convex, any feasible point in the set can be reached from x¯ by moving along some feasible direction. Examples of feasible directions are shown in Figure 3.1. In many applications, it is useful to maintain feasibility at every iteration. For example, the objective function may only be defined at feasible points. Or if the algorithm is terminated before an optimal solution has been found, only a feasible point may have practical value. These considerations motivate a class of methods called feasible-point methods. These methods have the following form. Algorithm 3.1. Feasible-Point Method 1. Specify some initial feasible guess of the solution x0 . 2. For k = 0, 1, . . . (i) Determine a feasible direction of descent pk at the point xk . If none exists, stop. (ii) Determine a new feasible estimate of the solution: xk+1 = xk + αk pk , where f (xk+1 ) < f (xk ).

i

i i

i

i

i

i

3.1. Basic Concepts

book 2008/10/23 page 79 i

79

In this chapter we are mainly concerned with representing feasible directions with respect to S in terms of the constraint vectors ai . We begin by characterizing feasible directions with respect to a single constraint. Specifically, we determine conditions that ensure that small movements away from a feasible point x¯ will keep the constraint satisfied. Consider first an equality constraint aiTx = bi . Let us examine the effect of taking a small positive step α in the direction p. Since aiTx¯ = bi , then aiT(x¯ + αp) = bi will hold if and only if aiTp = 0. Example 3.2 (An Equality Constraint). Suppose that we wished to solve minimize subject to

f (x1 , x2 ) x1 + x2 = 1.

For this constraint a1 = (1, 1)T and b1 = 1. Let x¯ = (0, 1)T so that x¯ satisfies the constraint. Then x¯ + αp will satisfy the constraint if and only if a1Tp = 0, that is, p1 + p2 = 0. For this example a1T(x¯ + αp) = (x¯1 + x¯2 ) + α(p1 + p2 ) = (1) + α(0) = 1, as expected. The original problem is equivalent to minimize f (x¯ + αp), α

where x¯ = (0, 1)T, as before, and where p = (1, −1)T is a vector satisfying a1Tp = 0. Expressing feasible points in the form x¯ + αp will be a way for us to transform constrained problems to equivalent problems without constraints. Continuing to inequality constraints, consider first some constraint aiTx ≥ bi which is inactive at x. ¯ Since aiTx¯ > bi , then aiT(x¯ + αp) > bi for all α sufficiently small. Thus, we can move a small distance in any direction p without violating the constraint. If the inequality constraint is active at x, ¯ we have aiTx¯ = bi . Then to guarantee that aiT(x¯ + αp) ≥ bi for small positive step lengths α, the direction p must satisfy aiTp ≥ 0. Example 3.3 (An Inequality Constraint). Suppose that we wished to solve minimize subject to

f (x1 , x2 ) x1 + x2 ≥ 1.

For this constraint a1 = (1, 1)T and b1 = 1. If x¯ = (0, 2)T, then the constraint is inactive and any nearby point is feasible. If x¯ = (0, 1)T, then the constraint is active and nearby points can be expressed in the form x¯ + αp with a1Tp ≥ 0. For this example this corresponds to the condition p1 + p2 ≥ 0, or p1 ≥ −p2 .

i

i i

i

i

i

i

80

book 2008/10/23 page 80 i

Chapter 3. Representation of Linear Constraints

In summary, we conclude that the feasible directions at a point x¯ are determined by the equality constraints and the active inequalities at that point. Let Iˆ denote the set of active inequality constraints at x. ¯ Then p is a feasible direction with respect to the feasible set at x¯ if and only if aiTp = 0,

i ∈ E,

aiTp ≥ 0,

ˆ i ∈ I.

In the following, it will be convenient to consider separately problems that have only equality constraints, or only inequality constraints. The general form of the equality-constrained problem is minimize subject to

f (x) Ax = b.

It is evident from our discussion above that a vector p is a feasible direction for the linear equality constraints if and only if Ap = 0. We call the set of all vectors p such that Ap = 0 the null space of A. A direction p is a feasible direction for the linear equality constraints if and only if it lies in the null space of A. The general form of the inequality-constrained problem is minimize subject to

f (x) Ax ≥ b.

Let x¯ be a feasible point for this problem. We have observed already that the inactive constraints at x¯ do not influence the feasible directions at this point. Let Aˆ be the submatrix of A corresponding to the rows of the active constraints at x. ¯ Then a direction p is a feasible direction for S at x¯ if and only if ˆ ≥ 0. Ap Since the inactive constraints at a point have no impact on its feasible directions, such constraints can be ignored when testing whether the point is locally optimal. In particular, if we had prior knowledge of which constraints are active at the optimum, we could cast aside the inactive constraints and treat the active constraints as equalities. A solution of the inequality-constrained problem is a solution of the equality-constrained problem defined by the active constraints. The theory for inequality-constrained problems draws on the theory for equality-constrained problems. For this reason, it is important to study problems with only equality constraints. In particular, it will be useful to study ways to represent all the vectors in the null space of a matrix. This is the topic of Sections 3.2 and 3.3. Once a feasible direction p is determined, the new estimate of the solution is of the form x¯ + αp where α ≥ 0. Since the new point must be feasible, in general there is an upper limit on how large α can be. For an equality constraint we have aiTp = 0, and so aiT(x¯ + αp) = aiTx¯ = bi

i

i i

i

i

i

i

3.1. Basic Concepts

book 2008/10/23 page 81 i

81

p

a Tx > b

1

a T p1 < 0

a T p2 = 0

aT p > 0 3

p2

p3

Figure 3.2. Movement to and away from the boundary. for all values of α. For an active inequality constraint we have aiTp ≥ 0, and so aiT(x¯ + αp) ≥ aiTx¯ ≥ bi for all values of α ≥ 0. Thus only the inactive constraints are relevant when determining an upper bound on α. Because x¯ is feasible, aiTx¯ > bi for all inactive constraints. Thus, if aiTp ≥ 0, the constraint remains satisfied for all α ≥ 0. As α increases, the movement is away from the boundary of the constraint. On the other hand, if aiTp < 0, the inequality will remain valid only if α ≤ (aiTx¯ −bi )/(−aiTp). A positive step along p is a move towards the boundary, and any step larger than this bound will violate the constraint. (See Figure 3.2.) The maximum step length α¯ that maintains feasibility is obtained from a ratio test:

α¯ = min (aiTx¯ − bi )/(−aiTp) : aiTp < 0 , where the minimum is taken over all inactive constraints. If aiTp ≥ 0 for all inactive constraints, then an arbitrarily large step can be taken without violating feasibility. Example 3.4 (Ratio Test). Let x¯ = (1, 1)T and p = (4, −2)T. Suppose that there are three inactive constraints with a1T = ( 1

4)

and

b1 = 3

= (0

3)

and

b2 = 2

= (5

1)

and

b3 = 4.

a2T a3T Then a1Tp = −4 < 0,

a2Tp = −6 < 0,

and

a3Tp = 18 > 0,

so only the first two constraints are used in the ratio test:

α¯ = min (aiTx¯ − bi )/(−aiTp) : aiTp < 0 = min { (5 − 3)/4, (3 − 2)/6 } = 1/6. Notice that the point x¯ + αp ¯ = ( 53 , 23 )T is on the boundary of the second constraint.

i

i i

i

i

i

i

82

book 2008/10/23 page 82 i

Chapter 3. Representation of Linear Constraints

Exercises 1.1. Find the sets of all feasible directions at points xa = (0, 0, 2)T, xb = (3, 0, 1)T, and xc = (1, 1, 1)T for Example 3.1. 1.2. Consider the set defined by the constraints x1 + x2 = 1, x1 ≥ 0, and x2 ≥ 0. At each of the following points determine the set of feasible directions: (a) (0, 1)T; (b) (1, 0)T; (c) (0.5, 0.5)T. 1.3. Consider the system of inequality constraints Ax ≥ b with  A=

9 6 1

4 −7 6

1 9 8 −4 3 −7

−7 −6 6



 and

b=

−15 −30 −20

 .

For the given values of x and p, perform a ratio test to determine the maximum step length α¯ such that x + αp ¯ remains feasible. (i) (ii) (iii) (iv)

x x x x

= (8, 4, −3, 4, 1)T and p = (1, 1, 1, 1, 1)T, = (7, −4, −3, −3, 3)T and p = (3, 2, 0, 1, −2)T, = (5, 0, −6, −8, −3)T and p = (5, 0, 5, 1, 3)T, = (9, 1, −1, 6, 3)T and p = (−4, −2, 4, −2, 2)T.

1.4. What are the potential consequences of miscalculating α¯ in the ratio test? 1.5. Let S = { x : Ax ≤ b }. Derive the conditions that must be satisfied by a feasible direction at a point x¯ ∈ S. 1.6. On a computer, there is a danger that an overflow can occur during the ratio test if, in a particular ratio, the numerator is large and the denominator is small. How can the ratio test be implemented so that this danger is removed?

3.2

Null and Range Spaces

Let A be an m × n matrix with m ≤ n. We denote the null space of A by

N (A) = p ∈ n : Ap = 0 . The null space of a matrix is the set of vectors orthogonal to the rows of the matrix. Recall that the null space represents the set of feasible directions for the constraints Ax = b. It is easy to see that any linear combination of two vectors in N (A) is also in N (A), and thus the null space is a subspace of n . It can be shown that the dimension of this subspace is n − rank(A). When A has full row rank (i.e., its rows are linearly independent), this is just n − m. Another term that will be important to our discussions is the range space of a matrix. This is the set of vectors spanned by the columns of the matrix (that is, the set of all linear combinations of these columns). In particular, we are interested in the range space of AT, defined by

R(AT) = q ∈ n : q = ATλ for some λ ∈ m .

i

i i

i

i

i

i

3.2. Null and Range Spaces

book 2008/10/23 page 83 i

83

R (A T ) N(A ):a T p = 0 a p x

q

Figure 3.3. Null space and range space of A = (a T). Throughout this text, if we mention a range space without specifying a matrix, it refers to the range space of AT. The dimension of the range space is the same as the rank of AT, or equivalently the rank of A. There is an important relationship between N (A) and R(AT): they are orthogonal subspaces. This means that any vector in one subspace is orthogonal to any vector in the other. To verify this statement, we note that any vector q ∈ R(AT) can be expressed as q = ATλ for some λ ∈ m , and therefore, for any vector p ∈ N (A) we have q Tp = λTAp = 0. There is more. Because the null and range spaces are orthogonal subspaces whose dimensions sum to n, any n-dimensional vector x can be written uniquely as the sum of a null-space and a range-space component: x = p + q, where p ∈ N (A) and q ∈ R(AT). Figure 3.3 illustrates the null and range spaces for A = (a T), where a is a two-dimensional nonzero vector. Notice that the vector a is orthogonal to the null space and that any range-space vector is a scalar multiple of a. The decomposition of a vector x into null-space and range-space components is also shown in Figure 3.3. How can we represent vectors in the null space of A? For this purpose, we define a matrix Z to be a null-space matrix for A if any vector in N (A) can be expressed as a linear combination of the columns of Z. The representation of a null-space matrix is not unique. If A has full row rank m, any matrix Z of dimension n × r and rank n − m that satisfies AZ = 0 is a null-space matrix. The column dimension r must be at least (n − m). In the special case where r is equal to n − m, the columns of Z are linearly independent, and Z is then called a basis matrix for the null space of A. If Z is an n × r null-space matrix, the null space can be represented as N (A) = { p : p = Zv

for some v ∈ r } ,

thus N (A) = R(Z). This representation of the null space gives us a practical way to generate feasible points. If x¯ is any point satisfying Ax = b, then all other feasible points

i

i i

i

i

i

i

84

book 2008/10/23 page 84 i

Chapter 3. Representation of Linear Constraints

can be written as x = x¯ + Zv for some vector v. As an example consider the rank-two matrix   1 −1 0 0 . A= 0 0 1 1 The null space of A is the set of all vectors p such that ⎛ ⎞  p1      p1 − p2 0 1 −1 0 0 ⎜ p2 ⎟ ; = = Ap = ⎝ ⎠ 0 0 0 1 1 p3 p3 + p 4 p4 that is, the vector must satisfy p1 = p2 and p3 = −p4 . Thus any null-space vector must have the form ⎛ ⎞ v1 ⎜ v ⎟ p =⎝ 1⎠ v2 −v2 for some scalars v1 and v2 . A possible basis matrix for the null space of A is ⎛ ⎞ 1 0 0⎟ ⎜1 Z=⎝ ⎠ 0 1 0 −1 and the null space can be expressed as N (A) = p : p = Zv The matrix

for some v ∈ 2 .



⎞ 1 0 2 0 2⎟ ⎜1 Z¯ = ⎝ ⎠ 0 1 −1 0 −1 1 is also a null-space matrix for A, but it is not a basis matrix since its third column is a linear combination of the first two columns. The null space of A can be expressed in terms of Z¯ as

N (A) = p : p = Z¯ v¯ for some v¯ ∈ 3 .

Exercises 2.1. In each of the following cases, compute a basis matrix for the null space of the matrix A and express the points xi as xi = pi + qi where pi is in the null space of A and qi is in the range space of AT.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 85 i

85

(i)

 A=

1 1 0

1 −1 1

1 −1 0

1 1 1

(ii)

 ,

⎛ ⎞ 1 ⎜3⎟ x1 = ⎝ ⎠ , 1 2 ⎛

A = (1

1

1

1),

⎞ −2 ⎜ 4⎟ x1 = ⎝ ⎠, 5 −2

(iii)  A= (iv)

 A=

1 1

1 −1

1 1 −1 1

1 1 2 0 1 −1

1 1 0 2 −1 1



⎞ 0 ⎜ −2 ⎟ x2 = ⎝ ⎠. −3 4 ⎛

⎞ 7 ⎜ 5⎟ x2 = ⎝ ⎠. −13 1

,

⎛ ⎞ 4 ⎜3⎟ x1 = ⎝ ⎠ , 4 0

⎞ −1 ⎜ 1⎟ x2 = ⎝ ⎠. 5 −5 ⎛

,

⎛ ⎞ 3 ⎜1⎟ x1 = ⎝ ⎠ , 1 2







⎞ 8 ⎜ 9⎟ x2 = ⎝ ⎠. −2 −4

2.2. Let Z be an n × r null-space matrix for the matrix A. If Y is any invertible r × r matrix, prove that Zˆ = ZY is also a null-space matrix for A. 2.3. Let A be a given m × n matrix and let Z be a null-space matrix for A. Let X be an invertible m × m matrix and let Y be an invertible n × n matrix. If a change of ˆ variable is made to transform A into Aˆ = XAY , how can Z be transformed into Z, ˆ a null-space matrix for A? 2.4. Let A be a full-rank m × n matrix and let Z be a basis matrix for the null space of A. Use the results of the previous problem to prove that, for appropriate choices of X and Y , Aˆ and Zˆ have the form   In−m , Aˆ = ( 0 Im ) and Zˆ = 0 where Im and In−m are identity matrices of the appropriate size. What is the corresponding result in the case where A is not of full rank and Z is any null-space matrix? 2.5. Let A be an m × n matrix with m < n. Prove that any n-dimensional vector x can be written uniquely as the sum of a null-space and a range-space component: x = p + q, where p ∈ N (A) and q ∈ R(AT). 2.6. Suppose that you are given a matrix A and a vector p and are told that p is in the null space of A. On a computer, you cannot expect that Ap will be exactly equal to zero because of rounding errors. How large would the computed value of Ap have to be before you could conclude that p was not in the null space of A? (Your

i

i i

i

i

i

i

86

book 2008/10/23 page 86 i

Chapter 3. Representation of Linear Constraints answers should incorporate the values of the machine precision and the components of A and p.) If the computed value of Ap is zero, can you conclude that p is in the null space of A?

3.3

Generating Null-Space Matrices

We present here four commonly used methods for deriving a null-space matrix for A. The discussion assumes that A is an m×n matrix of full row rank (and hence m ≤ n). Two of the approaches, the variable reduction method and the QR factorization, yield an n × (n − m) basis matrix for N (A). The other two methods yield an n × n null-space matrix.

3.3.1 Variable Reduction Method This method is the approach used by the simplex algorithm for linear programming. It is also used in nonlinear optimization (see Section 15.6). We start with an example. Consider the linear system of equations: p1 + p2 − p3 = 0 − 2p2 + p3 = 0. This system has the form Ap = 0. We wish to generate all solutions to this system. We can solve for any two variables whose associated columns in A are linearly independent in terms of the third variable. For example, we can solve for p1 and p3 in terms of p2 as follows: p1 = p2 p3 = 2p2 . The set of all solutions to the system can be written as   1 p = 1 p2 , 2 where p2 is chosen arbitrarily. Thus Z = (1, 1, 2)T is a basis for the null space of A. Since the values of p1 and p3 depend on p2 , they are called dependent variables. They are also sometimes called basic variables. The variable p2 which can take on any value is called an independent variable, or a nonbasic variable. To generalize this, consider the m × n system Ap = 0. Select any set of m variables whose corresponding columns are linearly independent—these will be the basic variables. Denote by B the m × m matrix defined by these columns. The remaining variables will be the nonbasic variables; we denote the m × (n − m) matrix of their respective columns by N . The general solution to the system Ap = 0 is obtained by expressing the basic variables in terms of the nonbasic variables, where the nonbasic variables can take on any arbitrary value.

i

i i

i

i

i

i

3.3. Generating Null-Space Matrices

Thus

book 2008/10/23 page 87 i

87

For ease of notation we assume here that the first m variables are the basic variables.   pB Ap = ( B N ) = BpB + NpN = 0. pN

Premultiplying the last equation by B −1 we get pB = −B −1 NpN . Thus the set of solutions to the system Ap = 0 is     pB −B −1 N p= pN , = I pN and the n × (n − m) matrix

 Z=

−B −1 N I



is a basis for the null space of A. Consider now the system Ax = b. One feasible solution is  −1  B b x¯ = . 0 If x is any point that satisfies Ax = b, then x can be written in the form   −1   −B −1 N B b x = x¯ + p = x¯ + ZpN = + pN . 0 I If the basis matrix B is chosen differently, then the representation of the feasible points changes, but the set of feasible points does not. In this derivation we assumed that the first m variables were the basic variables. If this is not true, the rows in Z must be reordered to correspond to the ordering of the basic and nonbasic variables. This technique is illustrated in the following example. Example 3.5 (Variable Reduction). Consider the system of constraints Ax = b with     5 1 −2 1 3 . and b = A= 6 0 1 1 4 Let B consist of the first two columns of A, and let N consist of the last two columns:     1 3 1 −2 . and N = B= 1 4 0 1 Then  x¯ =

B

−1

0

b





⎞ 17 ⎜ 6⎟ =⎝ ⎠ 0 0

i

i i

i

i

i

i

88

book 2008/10/23 page 88 i

Chapter 3. Representation of Linear Constraints

and



⎞ −3 −11 −B N ⎜ −1 −4 ⎟ =⎝ Z= ⎠. I 1 0 0 1 It is easy to verify that Ax¯ = b and AZ = 0. Every point satisfying Ap = 0 is of the form ⎞ ⎛ ⎛ ⎞ −3p3 − 11p4 −3 −11   ⎜ −p3 − 4p4 ⎟ ⎜ −1 −4 ⎟ p3 =⎝ ZpN = ⎝ ⎠. ⎠ p4 p3 1 0 p4 0 1 

−1



If instead B is chosen as columns 4 and 3 of A (in that order), and N as columns 2 and 1, then     −2 1 3 1 . and N = B= 1 0 4 1 Care must be taken in defining x¯ and Z to ensure that their components are positioned correctly. In this case ⎛ ⎞ 0   1 ⎜0⎟ −1 B b= and x¯ = ⎝ ⎠ . 2 2 1 −1 ¯ corresponding to the Notice that the components of B b are at positions 4 and 3 in x, columns of A that were used to define B. Similarly ⎛ ⎞ 0 1   −3 1 0⎟ ⎜ 1 and Z = ⎝ −B −1 N = ⎠. 11 −4 11 −4 −3 1 The rows of −B −1 N are placed in rows 4 and 3 of Z, and the rows of I are placed in rows 2 and 1. As before, Ax¯ = b and AZ = 0. Every point satisfying Ap = 0 is of the form ⎛ ⎞ ⎛ ⎞ p1 0 1   p2 0 ⎟ p2 ⎜ ⎟ ⎜ 1 =⎝ ZpN = ⎝ ⎠. ⎠ p1 11p2 − 4p1 11 −4 −3p2 + p1 −3 1 In practice the matrix Z itself is rarely formed explicitly, since the inverse of B should not be computed. This is not a limitation; Z is only needed to provide matrix-vector products of the form p = Zv, or the form Z Tg. These computations do not require Z explicitly. For example, the vector p = Zv may be computed as follows. First we compute t = N v. Next we compute u = −B −1 t, by solving the system Bu = −t. (This should be done via a numerically stable method such as the LU factorization.) The vector p = Zv is now given by p = (uT, v T)T. The variable reduction approach for representing the null space is the method used in the simplex algorithm for linear programming. This approach has been enhanced so that ever larger problems can be solved. These enhancements exploit the sparsity that is often present in large problems, in order to reduce computational effort and increase accuracy. A more detailed exposition of these techniques is given in Chapter 7.

i

i i

i

i

i

i

3.3. Generating Null-Space Matrices

book 2008/10/23 page 89 i

89

x

Px

Ap =0

Figure 3.4. Orthogonal projection.

3.3.2

Orthogonal Projection Matrix

Let x be an n-dimensional vector, and let A be an m × n matrix of full row rank. Then x can be expressed as a sum of two components, one in N (A) and the other in R(AT): x = p + q, where Ap = 0, and q = ATλ for some m-dimensional vector λ. Multiplying this equation on the left by A gives Ax = AATλ, from which we obtain λ = (AAT)−1 Ax. Substituting for q gives the null-space component of x: p = x − AT(AAT)−1 Ax = (I − AT(AAT)−1 A)x. The n × n matrix

P = I − AT(AAT)−1 A

is called an orthogonal projection matrix into N (A). The null-space component of the vector x can be found by premultiplying x by P ; the resulting vector P x is also termed the orthogonal projection of x onto N (A) (see Figure 3.4). The orthogonal projection matrix is the unique matrix with the following properties: • It is a null-space matrix for A; • P 2 = P , which means repeated application of the orthogonal projection has no further effect; • P T = P (P is symmetric). The name “orthogonal projection” may be misleading—unless P is the identity matrix it is not orthogonal. There are a number of ways to compute the projection matrix. Selection of the method depends in general on the application, the size of m and n, as well as the sparsity of A. We

i

i i

i

i

i

i

90

book 2008/10/23 page 90 i

Chapter 3. Representation of Linear Constraints

point out that by “computing the matrix” we mean representing the matrix so that a matrixvector product of the form P x can be formed for any vector x. The projection matrix itself is rarely formed explicitly. To demonstrate this point, suppose that A consists of a single row: A = a T, where a is an n-vector. Then 1 P = I − T aa T. a a Forming P explicitly would require approximately n2 /2 multiplications and n2 /2 storage locations. Forming the product P x for some vector x would require n2 additional multiplications. These costs can be reduced dramatically if only the vector a and the scalar a Ta are stored. “Forming” P this way only requires n multiplications in the calculation of (a Ta). The matrix-vector product is computed as P x = x − a(a Tx)/(a Ta). This requires only 2n multiplications. In the example above the matrix AAT is the scalar a Ta, which is easy to invert. In the more general case where A has several rows, the task of “inverting” AAT becomes expensive, and care must be taken to perform this in a numerically stable manner. Often, this is done by the Cholesky factorization. However, if A is dense it is not advisable to form the matrix AAT explicitly, since it can be shown that its condition number is the square of that of A. A more stable approach is to use a QR factorization of AT (see Appendix A.7.3 and Section 3.3.4 below). For the case when A is large and sparse, the QR factorization may be too expensive, since it tends to produce dense factors. Special techniques that attempt to exploit the sparsity structure of A have been developed for this situation.

3.3.3

Other Projections

As before, let A be an m × n matrix of full row rank. Let D be a positive-definite n × n matrix, and consider the n × n matrix PD = I − DAT(ADAT)−1 A. It is easy to show that PD is a null-space matrix for A. Also, PD PD = PD . An n × n matrix with these two properties is called a projection matrix. An orthogonal projection is therefore a symmetric projection matrix. Many of the new interior point algorithms for optimization use projections of this form. In the case of linear programming, the matrix D is generally a diagonal matrix with positive diagonal terms. This matrix D changes from iteration to iteration, while A remains unchanged. Special techniques for computing and updating these projections have been developed.

3.3.4 The QR Factorization Again let A be an m × n matrix with full row rank. We perform an orthogonal factorization of AT : AT = QR.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 91 i

91

Let Q = (Q1 , Q2 ), where Q1 consists of the first m columns of Q, and Q2 consists of the last n − m columns. Also denote the top m × m triangular submatrix of R by R1 . The rest of R is an (n − m) × m zero matrix. Since Q is an orthogonal matrix, it follows that AQ = R T, or AQ1 = R1T and AQ2 = 0. Thus Z = Q2 is a basis for the null space of A. This basis is also known as an orthogonal basis, since Z TZ = I . Example 3.6 (Generating a Basis Matrix Using the QR Factorization). Consider the matrix   1 −1 0 0 . A= 0 0 1 1 An orthogonal factorization of AT yields ⎛ √ ⎞ 0 −1/2 −1/2 −√2/2 2/2 −1/2 −1/2 ⎟ ⎜ √0 Q=⎝ ⎠, 0 −√2/2 1/2 −1/2 0 − 2/2 −1/2 1/2 hence



−1/2 ⎜ −1/2 Z=⎝ 1/2 −1/2

⎛ √ − 2 ⎜ 0 R=⎝ 0 0

0 √



− 2⎟ ⎠, 0 0

⎞ −1/2 −1/2 ⎟ ⎠ −1/2 1/2

is a basis for the null space of A. The QR factorization method has the important advantage that the basis Z can be formed in a numerically stable manner. Moreover, computations performed with respect to the resulting basis Z are numerically stable. (For further information, see the references cited in the Notes.) However, this numerical stability comes at a price, since computing the QR factorization is relatively expensive. If m is small relative to n, some savings may be gained by not forming Q explicitly. An additional drawback of the QR method is that the basis Z can be dense even when A is sparse. As a result it may be unsuitable for large sparse problems.

Exercises 3.1. For each of the following matrices, compute a basis for the null space using variable reduction (with A written in the form (B, N )). (i)

 A=

1 1 0

1 −1 1

1 1 −1 1 0 1

 .

i

i i

i

i

i

i

92

book 2008/10/23 page 92 i

Chapter 3. Representation of Linear Constraints (ii) A = (1 (iii)

 A=

(iv)

1 1

1

1

1 −1

1).

1 −1

1 1

 .



 1 1 1 1 A= 2 0 0 2 . 1 −1 −1 1 3.2. Compute the orthogonal projection matrix for each of the matrices in the previous problem. 3.3. Consider the system Ap = 0, where   1 2 0 2 . A= 2 1 2 4 Compute a basis for the null-space matrix of A using p2 and p3 as the basic variables. Use this to write a general expression for all solutions to this system. Could you do the same if p1 and p4 were the basic variables? 3.4. Let A be an m × n matrix of full row rank. Prove that the matrix AAT is positive definite, and hence its inverse exists. 3.5. Let A be an m × n matrix of full column rank. Prove that the matrix ATA is positive definite, and hence its inverse exists. 3.6. Let A be an m × n full row rank matrix and let Z be a basis for its null space. Prove that I − AT(AAT)−1 A = Z(Z TZ)−1 Z T. 3.7. Let P be the orthogonal projection matrix associated with an m × n full row rank matrix A. Prove that P has n − m linearly independent eigenvectors associated with the eigenvalue 1, and m linearly independent eigenvectors associated with the eigenvalue 0. 3.8. Prove that if P is the orthogonal projection matrix associated with N (A), then I − P is the orthogonal projection matrix associated with R(AT). 3.9. Let A = (1, 3, 2, −1)T and let x = (6, 8, −2, 1)T. Compute the orthogonal projection of x into the null space of A without explicitly forming the projection matrix. 3.10. Prove that an orthogonal projection matrix is positive semidefinite. 3.11. Let A be an m × n matrix of full row rank, and let P be the orthogonal projection matrix corresponding to A. Let a be an n-dimensional vector and suppose that a is not a linear combination of the rows of A. (i) Prove that a TP a = 0. (ii) Let Aˆ =



A aT

 ,

ˆ Prove that and let Pˆ be the orthogonal projection matrix corresponding to A. Pˆ = P − P a(a TP a)−1 a TP .

i

i i

i

i

i

i

3.4. Notes

book 2008/10/23 page 93 i

93

3.12. Let A be an m × n full row rank matrix and D an n × n positive-definite matrix. (i) Prove that the matrix ADAT is positive definite, and hence its inverse exists. (ii) Let PD = I −DAT(ADAT)−1 A. Prove that PD x = 0 if and only if x = DATη for some m-dimensional vector η. (iii) Prove that the matrix PD D is positive semidefinite, and x TPD Dx = 0, if and only if x = ATη for some vector η. 3.13. Compute an orthogonal basis matrix for the matrices in Exercise 3.1. 3.14. Consider the QR factorization of a full row rank matrix A. Prove that Q1 Q1 T + Q2 QT2 = I . 3.15. Consider the problem of forming the orthogonal projection matrix associated with a matrix A. One approach to avoid the potential ill-conditioning of the matrix AAT is to use the QR factorization for the matrix AAT. Assume that A has full row rank. (i) Prove that the AAT = R1TR1 and hence R1T is the lower triangular matrix of the Cholesky factorization for AAT. (ii) Prove that the resulting orthogonal projection is P = Q2 Q2 T . (iii) Prove that AT(AAT)−1 = Q1 R1−T . 3.16. Let A be a matrix with full row rank, and let Z be an orthogonal basis matrix for A. Prove that the orthogonal projection matrix associated with A satisfies P = ZZ T. 3.17. Let P be an orthogonal projection. Prove that P is unique. Hint: Let P = ZZ T where Z is an orthogonal basis matrix for the null space. Suppose that P1 is another orthogonal projection. Then P1 = ZV T for some full-rank matrix V . Now prove that V = Z. 3.18. Compute an orthogonal projection matrix for   1 1 1 1 . A= 2 2 2 2

3.4

Notes

Further information on these topics can be found in the books by Gill, Murray, and Wright (1991); Golub and Van Loan (1996); and Trefethen and Bau (1997).

i

i i

i

i

book 2008/10/23 page 94 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 95 i

Part II

Linear Programming

i

i i

i

i

book 2008/10/23 page 96 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 97 i

Chapter 4

Geometry of Linear Programming

4.1

Introduction

Linear programs can be studied both algebraically and geometrically. The two approaches are equivalent, but one or the other may be more convenient for answering a particular question about a linear program. The algebraic point of view is based on writing the linear program in a particular way, called standard form. Then the coefficient matrix of the constraints of the linear program can be analyzed using the tools of linear algebra. For example, we might ask about the rank of the matrix, or for a representation of its null space. It is this algebraic approach that is used in the simplex method, the topic of the next chapter. The geometric point of view is based on the geometry of the feasible region and uses ideas such as convexity to analyze the linear program. It is less dependent on the particular way in which the constraints are written. Using geometry (particularly in two-dimensional problems where the feasible region can be graphed) makes many of the concepts in linear programming easy to understand, because they can be described in terms of intuitive notions such as moving along an edge of the feasible region. There is a direct correspondence between these two points of view. This chapter will explore several aspects of this correspondence. Before giving an outline of the chapter, we show how a two-dimensional linear program can be solved graphically. Consider the problem minimize subject to

z = −x1 − 2x2 −2x1 + x2 ≤ 2 −x1 + x2 ≤ 3 x1 ≤ 3 x1 , x2 ≥ 0.

The feasible region is graphed in Figure 4.1. The figure also includes lines corresponding to various values of the objective function. For example, the line z = −2 = −x1 − 2x2 passes through the points (2, 0)T and (0, 1)T, 97

i

i i

i

i

i

i

98

book 2008/10/23 page 98 i

Chapter 4. Geometry of Linear Programming

z = -15 - 2 x1 + x2 = 2

6

5

4

3

x1 =3 2

z = -4 - x1 + x2 = 3

1

z = -2 -3

-2

0

-1 -1

1

2

3

4

z =0

Figure 4.1. Graphical solution of a linear program. and the parallel line z = 0 passes through the origin. The goal of the linear program is to minimize the value of z. As the figure illustrates, z decreases as these lines move upward and to the right. The objective z cannot be decreased indefinitely, however. Eventually the z line ceases to intersect the feasible region, indicating that there are no longer any feasible points corresponding to that particular value of z. The minimum occurs when z = −15 at the point (3, 6)T, that is, at the last point where an objective line intersects the feasible region. This is a corner of the feasible region. It is no coincidence that the solution occurred at a corner or extreme point. Proving this result will be the major goal of this chapter. To achieve this goal, we will first describe standard form, a particular way of writing a system of linear constraints. Standard form will be used to define a basic feasible solution. We will then show that the algebraic notion of a basic feasible solution is equivalent to the geometric notion of an extreme point. This equivalence is of value because, in higher dimensions, basic feasible solutions are easier to generate and identify than extreme points. It will then be shown how to represent any feasible point in terms of extreme points and directions of unboundedness (directions used in the description of unbounded feasible regions). Finally, this representation of feasible points will be used to prove that any linear program with a finite optimal solution has an optimal extreme point. This last result will, in turn, motivate our discussion of the simplex method, a method that solves linear programs by examining a sequence of basic feasible solutions, that is, extreme points.

Exercises 1.1. Solve the following linear programs graphically.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 99 i

99

(i) minimize subject to

z = 3x1 + x2 x1 − x2 ≤ 1 3x1 + 2x2 ≤ 12 2x1 + 3x2 ≤ 3 −2x1 + 3x2 ≥ 9 x1 , x2 ≥ 0.

maximize subject to

z = x1 + 2x2 2x1 + x2 ≥ 12 x1 + x2 ≥ 5 −x1 + 3x2 ≤ 3 6x1 − x2 ≥ 12 x1 , x2 ≥ 0.

(ii)

(iii) minimize subject to

z = x1 − 2x2 x1 − 2x2 ≥ 4 x1 + x2 ≤ 8 x1 , x2 ≥ 0.

minimize subject to

z = −x1 − x2 x1 − x2 ≥ 1 x1 − 2x2 ≥ 2 x1 , x2 ≥ 0.

minimize subject to

z = x 1 − x2 x1 − x2 ≥ 2 2x1 + x2 ≥ 1 x1 , x2 ≥ 0.

(iv)

(v)

(vi) minimize subject to

z = 4x1 − x2 x1 + x2 ≤ 6 x1 − x2 ≥ 3 −x1 + 2x2 ≥ 2 x1 , x2 ≥ 0.

maximize subject to

z = 6x1 − 3x2 2x1 + 5x2 ≥ 10 3x1 + 2x2 ≤ 40 x1 , x2 ≤ 15.

minimize subject to

z = x1 + 9x2 2x1 + x2 ≤ 100 x1 + x2 ≤ 80 x1 ≤ 40 x1 , x2 ≥ 0.

(vii)

(viii)

i

i i

i

i

i

i

100

book 2008/10/23 page 100 i

Chapter 4. Geometry of Linear Programming (ix) minimize subject to

(x) minimize subject to

z = 2x1 + 13x2 x1 + x2 ≤ 5 x1 + 2x2 ≤ 6 x1 , x2 ≥ 0. z = −5x1 − 7x2 −3x1 + 2x2 ≤ 30 −2x1 + x2 ≤ 12 x1 , x2 ≥ 0.

1.2. Find graphically all the values of the parameter a such that (−3, 4)T is the optimal solution of the following problem: maximize subject to

z = ax1 + (2 − a)x2 4x1 + 3x2 ≤ 0 2x1 + 3x2 ≤ 7 x1 + x2 ≤ 1.

1.3. Find graphically all the values of the parameter a such that the following systems define nonempty feasible sets. (i)

5x1 + x2 + x3 + 3x4 = a 8x1 + 3x2 + x3 + 2x4 = 2 − a x1 , x2 , x3 , x4 ≥ 0.

(ii)

ax1 + x2 + 3x3 − x4 = 2 x1 − x2 − x3 − 2x4 = 2 x1 , x2 , x3 , x4 ≥ 0.

1.4. Suppose that the linear program minimize subject to

z = cTx Ax = b x≥0

has an optimal objective z∗ . Discuss how the optimal objective would change if (a) a constraint is added to the problem; and (b) a constraint is deleted from the problem.

4.2

Standard Form

There are many different ways to represent a linear program. It is sometimes more convenient to use one instead of another, at times to make a property of the linear program more apparent, at other times to simplify the description of an algorithm. One such representation, called standard form, will be used to describe the simplex method.

i

i i

i

i

i

i

4.2. Standard Form

book 2008/10/23 page 101 i

101

In matrix-vector notation, a linear program in standard form will be written as minimize

z = cTx

subject to

Ax = b x≥0

with b ≥ 0. Here x and c are vectors of length n, b is a vector of length m, and A is an m × n matrix called the constraint matrix. The important things to notice are (i) it is a minimization problem, (ii) all the variables are constrained to be nonnegative, (iii) all the other constraints are represented as equations, and (iv) the components of the right-hand side vector b are all nonnegative. This will be the form of a linear program used within the simplex method. In other settings, other forms of a linear program may be more convenient. Example 4.1 (Standard Form). The linear program minimize

z = 4x1 − 5x2 + 3x3

subject to

3x1 − 2x2 + 7x3 = 7 8x1 + 6x2 + 6x3 = 5 x1 , x2 , x3 ≥ 0

is in standard form. In terms of the matrix-vector notation,       x1 4 3 −2 7 , x = x2 , c = −5 , A = 8 6 6 3 x3

  7 . b= 5

There are n = 3 variables and m = 2 constraints. All linear programs can be converted to standard form. The rules for doing this are simple and can be performed automatically by software. Most linear programming software packages allow the user to represent a linear program in any convenient way and then the software performs the conversion internally. We illustrate these techniques via examples. Justification for these rules is left to the Exercises. If the original problem is a maximization problem: maximize z = 4x1 − 3x2 + 6x3 = cTx, then the objective can be multiplied by −1 to obtain minimize zˆ = −4x1 + 3x2 − 6x3 = −cTx. After the problem has been solved, the optimal objective value must be multiplied by −1, so that z∗ = −ˆz∗ . The optimal values of the variables are the same for both objective functions. If any of the components of b are negative, then those constraints should be multiplied by −1. This will cause a constraint of the “≤” form to be converted to a “≥” constraint and vice versa. If a variable has a lower bound other than zero, say x1 ≥ 5,

i

i i

i

i

i

i

102

book 2008/10/23 page 102 i

Chapter 4. Geometry of Linear Programming

then the variable can be replaced in the problem by x1 = x1 − 5. The constraint x1 ≥ 5 is equivalent to x1 ≥ 0. An upper bound on a variable (say, x1 ≤ 7) can be treated as a general constraint, that is, as one of the constraints included in the coefficient matrix A. This is inefficient but satisfactory for explaining the simplex method. More efficient techniques for handling upper bounds are described in Section 7.2. A variable without specified lower or upper bounds, called a free or unrestricted variable, can be replaced by a pair of nonnegative variables. For example, if x2 is a free variable, then throughout the problem it will be replaced by x2 = x2 − x2

with

x2 , x2 ≥ 0.

Intuitively, x2 will record positive values of x2 , and x2 will record negative values. So if x2 = 7, then x2 = 7 and x2 = 0, and if x2 = −4, then x2 = 0 and x2 = 4. The properties of the simplex method ensure that at most one of x2 and x2 will be nonzero at a time (see the Exercises in Section 4.3). This is only one way of handling a free variable; an alternative is given in the Exercises; another is given in Section 7.6.6. The remaining two transformations are used to convert general constraints into equations. A constraint of the form 2x1 + 7x2 − 3x3 ≤ 10 is converted to an equality constraint by including a slack variable s1 : 2x1 + 7x2 − 3x3 + s1 = 10 together with the constraint s1 ≥ 0. The slack variable just represents the difference between the left- and right-hand sides of the original constraint. Similarly a constraint of the form 6x1 − 2x2 + 4x3 ≥ 15 is converted to an equality by including an excess variable e2 : 6x1 − 2x2 + 4x3 − e2 = 15 together with the constraint e2 ≥ 0. (For emphasis, the slack and excess variables are labeled here as s1 and e2 to distinguish them from the variables used in the original formulation of the linear program. In other settings it may be more convenient to label them like the other variables, for example as x4 and x5 . Of course, the choice of variable names does not affect the properties of the linear program.) Example 4.2 (Transformation to Standard Form). To illustrate these transformation rules, we consider the example maximize

z = −5x1 − 3x2 + 7x3

subject to

2x1 + 4x2 + 6x3 3x1 − 5x2 + 3x3 −4x1 − 9x2 + 4x3 x1 ≥ −2, 0 ≤ x2

=7 ≤5 ≤ −4 ≤ 4, x3 free.

i

i i

i

i

i

i

4.2. Standard Form

book 2008/10/23 page 103 i

103

To convert to a minimization problem, we multiply the objective by −1: minimize zˆ = 5x1 + 3x2 − 7x3 . The third constraint is multiplied by −1 so that all the right-hand sides of the constraints are nonnegative: 4x1 + 9x2 − 4x3 ≥ 4. The variable x1 will be transformed to x1 = x1 + 2. The upper bound x2 ≤ 4 will be treated here as one of the general constraints and the variable x3 will be transformed to x3 = x3 − x3 , because it is a free variable. When these substitutions have been made we obtain minimize subject to

zˆ = 5x1 + 3x2 − 7x3 + 7x3 − 10 2x1 + 4x2 + 6x3 − 6x3 = 11 3x1 − 5x2 + 3x3 − 3x3 ≤ 11 4x1 + 9x2 − 4x3 + 4x3 ≥ 12 x2 ≤ 4 x1 , x2 , x3 , x3 ≥ 0.

The constant term in the objective, “−10,” is usually removed via a transformation of the form z = zˆ + 10 so that we obtain the revised objective minimize z = 5x1 + 3x2 − 7x3 + 7x3 . The final step in the conversion is to add slack and excess variables to convert the general constraints to equalities: minimize subject to

z = 5x1 + 3x2 − 7x3 + 7x3 2x1 + 4x2 + 6x3 − 6x3 = 11 3x1 − 5x2 + 3x3 − 3x3 + s2 = 11 4x1 + 9x2 − 4x3 + 4x3 − e3 = 12 x2 + s4 = 4 x1 , x2 , x3 , x3 , s2 , e3 , s4 ≥ 0.

With this the original linear program has been converted to an equivalent one in standard form. In matrix-vector form it would be represented as minimize subject to

z = cTx Ax = b x≥0

i

i i

i

i

i

i

104

book 2008/10/23 page 104 i

Chapter 4. Geometry of Linear Programming

with c = (5, 3, −7, 7, 0, 0, 0)T, b = (11, 11, 12, 4)T, and ⎛ ⎞ 2 4 6 −6 0 0 0 3 −3 1 0 0⎟ ⎜ 3 −5 A=⎝ ⎠. 4 9 −4 4 0 −1 0 0 1 0 0 0 0 1 The vector of variables is x = (x1 , x2 , x3 , x3 , s2 , e3 , s4 )T. It can be shown that the solution to the problem in standard form is z = −0.12857, x1 = 0, x2 = 1.65714, x3 = 0.728571, x3 = 0, s2 = 17.1, e3 = 0, s4 = 2.34286, so that the solution to the original problem is z = 10.12857, x1 = −2, x2 = 1.65714, x3 = 0.728571. One of the reasons that the general constraints in the problem are converted to equalities is that it allows us to use the techniques of elimination to manipulate and simplify the constraints. For example, the system x1 = 1 x1 + x2 = 2 can be reduced to the equivalent system x1 = 1 x2 = 1 by subtracting the first constraint from the second. However, if we erroneously apply the same operation to x1 ≥ 1 x1 + x2 ≥ 2, then it results in x1 ≥ 1 x2 ≥ 1, a system of constraints that defines a different feasible region. The two regions are illustrated in Figure 4.2. Elimination is not a valid way to manipulate systems of inequalities because it can alter the set of solutions to such systems. It might seem that the rules for transforming a linear program to standard form could greatly increase the size of a linear program, particularly if a large number of slack and excess variables must be added to obtain a problem in standard form. However, these new variables only appear in the problem in a simple way so that the additional variables do not make the problem significantly harder to solve.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 105 i

105

x2

x2

2

2

1

1

1

2

x1

1

before elimination

2

x1

after elimination

Figure 4.2. Elimination and inequalities.

Exercises 2.1. Convert the following linear program to standard form: maximize subject to

z = 3x1 + 5x2 − 4x3 7x1 − 2x2 − 3x3 ≥ 4 −2x1 + 4x2 + 8x3 = −3 5x1 − 3x2 − 2x3 ≤ 9 x1 ≥ 1, x2 ≤ 7, x3 ≥ 0.

2.2. Convert the following linear program to standard form: minimize subject to

z = x1 − 5x2 − 7x3 5x1 − 2x2 + 6x3 ≥ 5 3x1 + 4x2 − 9x3 = 3 7x1 + 3x2 + 5x3 ≤ 9 x1 ≥ −2, x2 , x3 free.

2.3. Convert the following linear program to standard form: maximize subject to

z = 6x1 − 3x2 2x1 + 5x2 ≥ 10 3x1 + 2x2 ≤ 40 x1 , x2 ≤ 15.

2.4. Consider the linear program in Example 4.2. Convert it to standard form, except do not make the substitution x3 = x3 − x3 . Show that the problem can be replaced by an equivalent problem with one less variable and one less constraint by eliminating

i

i i

i

i

i

i

106

book 2008/10/23 page 106 i

Chapter 4. Geometry of Linear Programming

x3 using the equality constraints. (This is a general technique for handling free variables.) Why cannot this technique be used to eliminate variables with nonnegativity constraints? 2.5. Consider the linear program minimize subject to

z = cTx Ax ≤ b eTx = 1 x1 , . . . , xn−1 ≥ 0, xn free,

where e = (1, . . . , 1)T, b and c are arbitrary vectors of length n, and A is the matrix with entries ai,i = ai,n = 1 for i = 1, . . . , n and all other entries zero. Use the constraint eTx = 1 to eliminate the free variable xn from the linear program (as in the previous problem). Is this a good approach when n is large? 2.6. Prove that each of the transformation rules used to convert a linear program to standard form produces an equivalent linear programming problem. Hint: For each of the rules, prove that a solution to the original problem can be used to obtain a solution to the transformed problem, and vice versa. 2.7. Consider the linear program minimize subject to

z = cTx Ax = b x ≥ 0.

Transform it into an equivalent standard-form problem for which the right-hand-side vector is zero. Hint: You can achieve this by introducing an additional variable and an additional constraint.

4.3

Basic Solutions and Extreme Points

In this section we examine the relationship between the geometric notion of an extreme point of the feasible region and the algebraic notion of a basic feasible solution. First, it is necessary to give a precise definition of both these terms. To do this, let us consider a linear programming problem in standard form minimize subject to

z = cTx Ax = b x ≥ 0.

In this problem x is a vector of length n and A is an m × n matrix with m ≤ n. We will assume that the matrix A has full rank, that is, the rows of A are linearly independent. The full-rank assumption is not unreasonable. If A is not of full rank, then either the constraints are inconsistent or there are redundant constraints, depending on the right-handside vector b. If the constraints are inconsistent, then the problem has no solution and the feasible region is empty, so there are no extreme points. If there are redundant constraints,

i

i i

i

i

i

i

4.3. Basic Solutions and Extreme Points

book 2008/10/23 page 107 i

107

Figure 4.3. Definition of an extreme point. then theoretically they could be removed from the problem without changing either the solution or the feasible region. If m = n, then the constraints Ax = b would completely determine x, and the feasible region would consist of either a single point (if x ≥ 0) or would be empty (otherwise). If m > n, then in most cases the constraints Ax = b would have no solution. An extreme point is defined geometrically using convexity. A point x ∈ S is an extreme point or vertex of a convex set S if it cannot be expressed in the form x = αy + (1 − α)z with y, z ∈ S, 0 < α < 1, and y, z = x. That is, x cannot be expressed as a convex combination of feasible points y and z different from x. See Figure 4.3. Notice that the values α = 0 and α = 1 are excluded in this definition. If α = 0 then x = z, and if α = 1 then x = y. Since y and z are supposed to be different from x, these two cases are ruled out. The definition of an extreme point applies to any convex set. In particular, since a system of linear constraints defines a convex set (see Section 2.3), it applies to the feasible region of a linear programming problem. A basic solution is defined algebraically using the standard form of the constraints. A point x is a basic solution if • x satisfies the equality constraints of the linear program, and • the columns of the constraint matrix corresponding to the nonzero components of x are linearly independent. Since the matrix A has full row rank, it is possible to separate the components of x into two subvectors, one consisting of n − m nonbasic variables xN all of which are zero, and the other consisting of m basic variables xB whose constraint coefficients correspond to an invertible m × m basis matrix B. In cases where more than n − m components of x are zero there may be more than one way to choose xB and xN . The set of basic variables is called the basis. A point x is a basic feasible solution if in addition it satisfies the nonnegativity constraint x ≥ 0. It is an optimal basic feasible solution if it is also optimal for the linear

i

i i

i

i

i

i

108

book 2008/10/23 page 108 i

Chapter 4. Geometry of Linear Programming x2

- 2 x 1 + x2= 2 xd

6 5 4

x 1= 3

xc

xf 3

- x 1 + x2= 3

2

xb

1

xe -3

-2

xa

-1

2

1

3

4

x1

Figure 4.4. Feasible region. program. The word “solution” in these definitions refers only to the equality constraints for the linear program in standard form, and has no connection with the value of the objective function. In Section 4.4 we show that if a linear program has an optimal solution, then it has an optimal basic feasible solution. For this reason it will be sufficient to examine just the basic feasible solutions when solving a linear programming problem. Example 4.3 (Basic Feasible Solutions). Consider the linear program from Section 4.1: minimize subject to

z = −x1 − 2x2 −2x1 + x2 ≤ 2 −x1 + x2 ≤ 3 x1 ≤ 3 x1 , x2 ≥ 0.

The feasible region for this problem is illustrated in Figure 4.4, and the optimal value of this problem is z∗ = −15 at the point x∗ = (3, 6)T. The graph will be used to examine the extreme points. The boundaries of the feasible region are defined by the lines −2x1 + x2 −x1 + x2 x1 x1 x2

=2 =3 =3 =0 =0

and each corner of the feasible region corresponds to the intersection of two of these lines. There are ten potential intersections of this type, but only five of them (xa , xb , xc , xd , xe ) are corners of the feasible region. Four others lie outside the feasible region, and one pairing is impossible since the lines x1 = 0 and x1 = 3 do not intersect.

i

i i

i

i

i

i

4.3. Basic Solutions and Extreme Points

book 2008/10/23 page 109 i

109

In standard form this linear program is written as z = −x1 − 2x2 −2x1 + x2 + s1 −x1 + x2 + s2 x1 + s3 x1 , x2 , s1 , s2 , s3

minimize subject to

=2 =3 =3 ≥ 0.

Standard form will be used to describe the basic feasible solutions. In this form the problem has five variables. In our example, the basis { x2 , s1 , s3 } produces the basic solution ( x1

x2

s1

s3 )T = ( 0

s2

3

−1

3 )T ;

0

it corresponds to the infeasible corner xf . The basis { s1 , s2 , s3 } produces the basic feasible solution ( x1

x2

s1

s3 )T = ( 0

s2

0

2

3

3 )T ;

it corresponds to the corner xa . If the basis { x1 , x2 , s1 } is chosen, we obtain the optimal basic feasible solution ( x1

x2

s1

s3 )T = ( 3

s2

6

2

0

0 )T ;

it corresponds to the corner xd . We will show how to determine basic feasible and optimal basic feasible solutions when we discuss the simplex method in Chapter 5. Two different bases can correspond to the same point. To see this, consider the constraints defined by  Ax =

2 3 4

1 0 0

0 1 0

0 0 1



⎞ x1   6 ⎜ x2 ⎟ ⎝ ⎠ = 13 = b. x3 12 x4 ⎛

If x = (3, 0, 4, 0)T ≥ 0, then there is ambiguity about the choice of xB and xN . If xB = (x1 , x2 , x3 )T and xN = (x4 ), then the coefficient matrix for the nonzero components of xB 

2 3 4

has linearly independent columns, so x is a coefficient matrix for xB  2 B= 3 4

0 1 0



basic feasible solution. In this example the 1 0 0

0 1 0



is invertible. The same basic feasible solution is obtained using xB = ( x1

x3

x4 )T

and

xN = ( x2 )

i

i i

i

i

i

i

110

book 2008/10/23 page 110 i

Chapter 4. Geometry of Linear Programming

with invertible basis matrix

 B=

2 3 4

0 1 0

0 0 1

 .

Because of this ambiguity, the point (3, 0, 4, 0)T is called a degenerate basic feasible solution. Let x be any basic feasible solution. Once a set of basic variables has been selected it is possible to reorder the variables so that the basic variables are listed first:   xB x= . xN The constraint matrix can then be written as A = (B

N ),

where B is the coefficient matrix for xB and N is the coefficient matrix for xN . For a basic solution we have xN = 0, so that the set of constraints Ax = b simplifies to BxB = b:   xB Ax = ( B N ) = BxB + N xN = BxB = b. xN Thus xB , and hence x, is determined by B and b. The number of basic feasible solutions is finite and is bounded by the number of ways that the m variables xB can be selected from among the n variables x. This number is a binomial coefficient   n n! = , m m!(n − m)! where n! = n(n − 1)(n − 2) · · · 3 · 2 · 1. Not all choices of xB will necessarily correspond to feasible points, so this number can be an overestimate. The concept of an extreme point is equivalent to the concept of a basic feasible solution, as is proved in the following theorem. Theorem 4.4. A point x is an extreme point of the set { x : Ax = b, x ≥ 0 } if and only if it is a basic feasible solution. Proof. We first show that if x is a basic feasible solution, then it is also an extreme point. If x is a basic feasible solution, then it is a feasible point. For convenience we may assume that the last n − m variables of x are nonbasic so that     xB xB . x= = xN 0

i

i i

i

i

i

i

4.3. Basic Solutions and Extreme Points

book 2008/10/23 page 111 i

111

Let B be the invertible basis matrix corresponding to xB . The proof will be by contradiction: If x is not an extreme point, then there exist two distinct feasible points y and z satisfying x = αy + (1 − α)z with 0 < α < 1. We will write y and z in terms of the same basis     yB zB y= and z = . yN zN Both y and z are feasible, so that yN ≥ 0 and zN ≥ 0. Since 0 = xN = αyN + (1 − α)zN and 0 < α < 1, all the terms on the right-hand side are nonnegative, and we can conclude that yN = zN = 0. Also, because x, y, and z are feasible they satisfy the equality constraints of the problem, so that BxB = ByB = BzB = b. Since B is invertible, xB = yB = zB , contradicting our assumption that y and z were distinct from x. Hence x is an extreme point. The more difficult part of the proof is to show that if x is an extreme point then it is a basic feasible solution. This will also be proved by contradiction. An extreme point x must be feasible so that Ax = b and x ≥ 0. By reordering the variables if necessary so that the zero variables are last, x can be written as   xB x= , xN where xN = 0 and xB > 0. We write A = (B, N ) where B and N are the coefficients corresponding to xB and xN , respectively. (B may not be a square matrix.) If the columns of B are linearly independent, then x is a basic feasible solution, and nothing needs to be proved. So we will suppose that the columns of B are linearly dependent and construct distinct feasible points y and z that satisfy x = 12 y + 12 z, hence showing that x cannot be an extreme point. Let Bi be the ith column of B. If the columns of B are linearly dependent, then there exist real numbers p1 , . . . , pk , not all of which are zero, such that B1 p1 + B2 p2 + · · · + Bk pk = 0. If we define p = (p1 , . . . , pk )T, then the above equation can be written as Bp = 0. Note that B(xB ± αp) = BxB ± αBp = BxB ± 0 = BxB = b for all values of α. Since xB > 0, for small positive values of  we will have xB + p > 0 xB − p > 0. Let

 y=

xB + p xN



 and

z=

xB − p xN

 .

Then y and z are feasible and distinct from x. Since x = 12 y + 12 z, this contradicts our assumption that x was an extreme point. This completes the proof.

i

i i

i

i

i

i

112

book 2008/10/23 page 112 i

Chapter 4. Geometry of Linear Programming

It is possible that one or more of the basic variables in a basic feasible solution will be zero. If this occurs, then the point is called a degenerate vertex, and the linear program is said to be degenerate. At a degenerate vertex several different bases may correspond to the same basic feasible solution. This was illustrated in the latter part of Example 4.3, where the basic feasible solution (x1 , x2 , x3 , x4 )T = (3, 0, 4, 0)T could be represented using either xB = (x1 , x2 , x3 )T or xB = (x1 , x3 , x4 )T. Degeneracy can arise when a linear program contains a redundant constraint. For example, the constraints in Example 4.3 arose when slack variables were added to the constraints 2x1 ≤ 6 3x1 ≤ 13 4x1 ≤ 12. In this form, the first and third constraints are equivalent, and so either of them could be removed from the problem without changing its solution. There are several more definitions that will be useful when discussing the simplex method. Geometrically, two extreme points areadjacent if they are connected by an edge of the feasible region. For example, in Figure 4.4 the extreme points xa and xb are adjacent, but xa and xc are not. For a linear program in standard form with m equality constraints, two bases will be adjacent if they have m − 1 variables in common. Adjacent bases define adjacent basic feasible solutions. (Note that adjacent bases may not define distinct basic feasible solutions; see Example 4.3.) One further concept is needed to describe the feasible region geometrically, the concept of a direction of unboundedness. (Some authors use the term direction of a set.) If S is a convex set, then d = 0 is a direction of unboundedness if x + γd ∈ S

for all x ∈ S and γ ≥ 0.

As we will show in the next section, every feasible point can be represented as a convex combination of extreme points plus, if applicable, a direction of unboundedness. Example 4.5 (Direction of Unboundedness). We obtain an unbounded feasible region by deleting one constraint from our example: minimize subject to

z = −x1 − 2x2 −2x1 + x2 ≤ 2 −x1 + x2 ≤ 3 x1 , x2 ≥ 0.

The feasible region for this new problem is illustrated in Figure 4.5. Now there are only three extreme points, xa = (0, 0)T, xb = (0, 2)T, and xc = (1, 4)T. The point y = (2, 1)T cannot be represented as a convex combination of these extreme points. This follows from the conditions α 1 x a + α 2 x b + α 3 xc = y α1 + α2 + α3 = 1 α1 , α2 , α3 ≥ 0.

i

i i

i

i

i

i

4.3. Basic Solutions and Extreme Points x2

book 2008/10/23 page 113 i

113

- 2 x1 + x2 = 2

6 5

xc

4 3 2

- x1 + x2 = 3

xb 1

-3

-2

xa

-1

1

2

3

4

x1

Figure 4.5. Unbounded feasible region. The first condition represents two linear equations, one for each component of y. Combined with the second condition, it gives the linear system 

0 0 1

0 2 1

1 4 1



α1 α2 α3



  2 = 1 1

whose unique solution is α1 = 5/2, α2 = −7/2, α3 = 2. Since α2 < 0, this is not a convex combination. The triangular area in Figure 4.5 shows which points are convex combinations of extreme points. For this example, if x is any feasible point and γ ≥ 0, then any point   1 x+γ 0 is also feasible. The direction (1, 0)T is a direction of unboundedness because it is possible to move arbitrarily far in that direction and remain feasible. In this example it is possible to select two linearly independent directions of unboundedness, such as d1 = (1, 0)T and d2 = (1, 1)T. It is not difficult to show that any feasible point can be written as a convex combination of the extreme points xa , xb , and xc , plus some multiple of either of these directions of unboundedness. Let x be a feasible point for the linear program in standard form (Ax = b, x ≥ 0) and let d be a direction of unboundedness. Then both x and x + γ d must be feasible for all γ ≥ 0, so that Ax = b, A(x + γ d) = b,

x ≥ 0, x + γ d ≥ 0.

i

i i

i

i

i

i

114

book 2008/10/23 page 114 i

Chapter 4. Geometry of Linear Programming

Together these conditions show that a direction of unboundedness must satisfy Ad = 0 d ≥ 0. In addition, any nonzero vector d satisfying these two conditions will be a direction of unboundedness; see the Exercises.

Exercises 3.1. Consider the system of linear constraints 2x1 + x2 x1 + x2 x1 x1 , x2

≤ 100 ≤ 80 ≤ 40 ≥ 0.

(i) Write this system of constraints in standard form, and determine all the basic solutions (feasible and infeasible). (ii) Determine the extreme points of the feasible region (corresponding to both the standard form of the constraints, as well as the original version). 3.2. Consider the following system of inequalities: x1 + x2 ≤ 5 x1 + 2x2 ≤ 6 x1 , x2 ≥ 0. (i) Find the extreme points of the region defined by these inequalities. (ii) Does this set have any directions of unboundedness? Either prove that none exist, or give an example of a direction of unboundedness. 3.3. Consider the feasible region in Figure 4.5. (i) Show that d1 = (1, 0)T and d2 = (1, 1)T are directions of unboundedness. Determine the corresponding directions of unboundedness for the problem written in standard form, and verify that the conditions Ad = 0 and d ≥ 0 are satisfied for both directions. (ii) Prove that d is a direction of unboundedness if and only if d is a nonnegative combination of d1 and d2 . 3.4. Consider the linear program minimize subject to

z = −5x1 − 7x2 −3x1 + 2x2 ≤ 30 −2x1 + x2 ≤ 12 x1 , x2 ≥ 0.

i

i i

i

i

i

i

Exercises (i) (ii) (iii) (iv)

book 2008/10/23 page 115 i

115 Draw a graph of the feasible region. Determine the extreme points of the feasible region. Determine two linearly independent directions of unboundedness. Convert the linear program to standard form and determine the basic feasible solutions and two linearly independent directions of unboundedness for this version of the problem. Verify that the directions of unboundedness satisfy Ad = 0 and d ≥ 0.

3.5. Consider a linear program with the constraints in standard form Ax = b

and

x ≥ 0.

Ad = 0

and

d ≥ 0,

Prove that if d = 0 satisfies

then d is a direction of unboundedness. 3.6. Consider the system of constraints 2x1 + x2 3x1 + x2 4x1 + x2 5x1 + x2 x1 , x2

≤3 ≤4 ≤5 ≤6 ≥ 0.

(i) Determine the extreme points for the feasible region. (ii) Convert the problem to standard form, and determine the basic feasible solutions. (iii) Which basic feasible solution corresponds to the extreme point (1, 1)T? How many different bases can be used to generate this basic feasible solution? Which of these bases are adjacent? 3.7. Find all the vertices of the region defined by the following system: 3x1 + x2 + x3 + x4 = 1 x1 + 6x2 − 2x3 + x4 = 1 x1 , x2 , x3 , x4 ≥ 0. Does the system have degenerate vertices? 3.8. Find all the values of the parameter a such that the regions defined by the following systems have degenerate vertices. (i)

x1 + x2 ≤ 8 6x1 + x2 ≤ 12 2x1 + x2 ≤ a x1 , x2 ≥ 0.

i

i i

i

i

i

i

116

book 2008/10/23 page 116 i

Chapter 4. Geometry of Linear Programming (ii)

ax1 + x2 ≥ 1 2x1 + x2 ≤ 6 −x1 + x2 ≤ 6 x1 + 2x2 ≥ 6 x1 , x2 ≥ 0.

3.9. Consider a linear program with the following constraints: 4x1 + 7x2 + 2x3 − 3x4 + x5 + 4x6 = 4 −x1 − 2x2 + x3 + x4 − x6 = −1 x2 − 3x3 − x4 − x5 + 2x6 = 0 xi ≥ 0, i = 1, . . . , 6. Determine every basis that corresponds to the basic feasible solution (0, 1, 0, 1, 0, 0)T. 3.10. Consider the feasible region in Figure 4.4. Determine formulas for the points on the edges of the feasible region. What are the corresponding formulas for the problem in standard form? The formulas you determine should be of the form (extreme point) + α(direction)

for 0 ≤ α ≤ αmax .

3.11. Repeat the previous problem for the feasible region in Figure 4.5. Note that in some cases there will be no upper bound on α. 3.12. Consider the system of constraints Ax = b, x ≥ 0 with     1 4 7 1 0 0 12 A= 2 5 8 0 1 0 and b = 15 . 3 6 9 0 0 1 18 Is x = (1, 1, 1, 0, 0, 0)T a basic feasible solution? Explain your answer. 3.13. Suppose that a linear program includes a free variable xi . In converting this problem to standard form, xi is replaced by a pair of nonnegative variables: xi = xi − xi ,

xi , xi ≥ 0.

Prove that no basic feasible solution can include both xi and xi as basic variables. 3.14. Let the m × n matrix A be the coefficient matrix for a linear program in standard form. The upper bound   n n! = m m!(n − m)! on the number of basic feasible solutions can sometimes be precise, but it can also be a considerable overestimate. (i) Construct an example with n =  4 and m = 2 where the number of basic feasible solutions is equal to mn . (ii) Construct examples of arbitrary size where the number of basic feasible solutions is equal to zero. 3.15. Prove that the set S = { x : Ax < b } does not contain any extreme points.

i

i i

i

i

i

i

4.4. Representation of Solutions; Optimality

book 2008/10/23 page 117 i

117

3.16. Let S = x : x Tx ≤ 1 . Prove that the extreme points of S are the points on its boundary. 3.17. Consider the set S = { x : x1 ≥ x2 ≥ · · · ≥ xn ≥ 0 }. (i) Prove that if x ∈ S then so is αx ∈ S for all α ≥ 0. A set with this property is called a cone. (ii) Prove that the origin is the only extreme point of S. (iii) Find n linearly independent directions of unboundedness for this set. 3.18. Give an example of a degenerate linear program that does not contain a redundant constraint. 3.19. Give an example of a linear program where a degenerate basic feasible solution only corresponds to a single basis.

4.4

Representation of Solutions; Optimality

The first goal of this section is to prove that any feasible point can be represented as a convex combination of extreme points plus, possibly, a direction of unboundedness. Then this result will be used to prove that any linear program with a finite optimal solution has an optimal basic feasible solution. The idea behind the representation theorem is straightforward and will first be illustrated using two examples of feasible sets, one bounded and one unbounded. The examples will be in two dimensions so they can be graphed, but the techniques used in the examples are the same as those used in the proof. We will use the examples from Section 4.3. First we consider a bounded problem with the constraints −2x1 + x2 −x1 + x2 x1 x1 , x2

≤2 ≤3 ≤3 ≥ 0.

We would like to show that if x is any feasible point, then it can be expressed as a convex combination of extreme points of the feasible region. Our discussion will be based on Figure 4.6. Let us choose the feasible point x = (2, 1)T. We would like to express x as a convex combination of the extreme points xa , . . . , xe . Consider the direction p = (1, 1)T. Since x is in the interior of the feasible region, x + γp will be feasible for small values of γ . (By “small” we mean small in absolute value.) However, since the region is bounded, as we move along p or −p eventually we will hit the boundary of the region. In this example this occurs at the points y1 = x + p = (3, 2)T and y2 = x − p = (1, 0)T, that is, for γ = 1 and γ = −1. Notice that x = 12 y1 + 12 y2 so that x is a convex combination of y1 and y2 . Neither y1 nor y2 is an extreme point; both are along an edge of the feasible region. For small values of γ the points y1 + γp1 and y2 + γp2 will be feasible, where p1 = (0, 1)T and p2 = (1, 0)T. However, as γ is increased in magnitude, we will eventually hit

i

i i

i

i

i

i

118

book 2008/10/23 page 118 i

Chapter 4. Geometry of Linear Programming x2

- 2 x 1 + x2= 2 xd

6 5 4

x 1= 3

xc

xf 3

- x 1 + x2= 3

2

y1 =

2 3

xe +

1 3

xd

xb x=

1

1 2

y1 +

1 2

y2

xe -3

-2

-1

xa

1

y2 =

2

2 3

xa +

3

1 3

4

x1

xe

Figure 4.6. Representation via extreme points: Bounded case. another boundary of the region. For y1 this occurs at y11 = y1 + 4p1 = (3, 6)T = xd and y12 = y1 − 2p1 = (3, 0)T = xe , and for y2 this occurs at y21 = y2 + 2p2 = (3, 0)T and y22 = y2 − 1p2 = (0, 0)T. The points y1 and y2 can be written as y1 = 23 y12 + 13 y11 y2 = 23 y22 + 13 y21 . The points on the right-hand side are extreme points. Since x = 12 y2 + 12 y1 we can combine these results to obtain x = 13 y22 + 16 y21 + 13 y12 + 16 y11 = 13 xa + 16 xe + 13 xe + 16 xd = 13 xa + 12 xe + 16 xd . Thus we have expressed x as a convex combination of extreme points. Now we will consider the unbounded region obtained by deleting one of the constraints: −2x1 + x2 ≤ 2 −x1 + x2 ≤ 3 x1 , x2 ≥ 0. We would like to show that if x is any feasible point, then it can be expressed as a convex combination of extreme points plus, if required, a direction of unboundedness. Our discussion will be based on Figure 4.7. Let us again choose the feasible point x = (2, 1)T and the direction p = (1, 1)T. As before, x + γp will be feasible for small values of γ . For γ < 0, the boundary is

i

i i

i

i

i

i

4.4. Representation of Solutions; Optimality x2 6

book 2008/10/23 page 119 i

119

- 2 x1 + x2 = 2

5 4

xc

3 2

- x1 + x2 = 3

xb x = p + y2

1

p -3

-2

-1

xa p2

1

2

3

4

x1

y2 = x a + p 2

Figure 4.7. Representation via extreme points: Unbounded case. encountered at the point y2 = x − p = (1, 0)T. However, the direction p is a direction of unboundedness so that x + γp is feasible for all positive values of γ . In this case we will represent x as the sum of a direction of unboundedness and a point on the boundary, that is, x = p + y2 . The point y2 is not an extreme point so we will represent it in terms of other points along the same edge. For p2 = (1, 0)T we examine points of the form y2 + γp2 . Another boundary is encountered at the point y22 = y2 − p2 = (0, 0)T. In the direction p2 the region is unbounded and y2 = p2 + y22 , that is, y2 is the sum of a direction of unboundedness and an extreme point. Combining these two results we obtain x = p + y2 = p + (p2 + y22 ) = (p + p2 ) + y22 = pˆ + xa , where pˆ = p + p2 = (2, 1)T, another direction of unboundedness. In this way we have expressed x as the sum of a direction of unboundedness and a (trivial) convex combination of extreme points. The representation theorem is given below. For the examples above, the constraints were not in standard form; this was so the examples could be graphed easily. The theorem works with a problem expressed in standard form. This is not an essential detail—it merely eliminates ambiguity about how the constraints are represented. The argument is the same. To point out the connection between the two approaches, we write the constraints for the unbounded example in standard form, that is, S = { x : Ax = b, x ≥ 0 } with     2 −2 1 1 0 . and b = A= 3 −1 1 0 1 The point x = (2, 1)T is transformed into x¯ = (2, 1, 5, 4)T, where x¯3 = 5 and x¯4 = 4 are the slack variables for the two constraints. The direction p = (1, 1)T is transformed into the

i

i i

i

i

i

i

120

book 2008/10/23 page 120 i

Chapter 4. Geometry of Linear Programming

¯ = b or, direction p¯ = (1, 1, 1, 0)T, with the last two components chosen so that A(x¯ + p) equivalently, Ap¯ = 0. Theorem 4.6 (Representation Theorem). Consider the set S = { x : Ax = b, x ≥ 0 }, representing the feasible region for a linear program in standard form. Let V = { v1 , v2 , . . . , vk } be the set of extreme points (vertices) of S. If S is nonempty, then V is nonempty, and every feasible point x ∈ S can be written in the form x=d+

k

αi v i ,

i=1

where

k

αi = 1 and αi ≥ 0,

i = 1, . . . , k,

i=1

and d satisfies Ad = 0 and d ≥ 0, i.e., either d = 0 or d is a direction of unboundedness of S. Proof. The proof will make repeated use of the equivalence between extreme points and basic feasible solutions. We will assume that A is of full row rank, since if A is not of full row rank it can be replaced by a smaller full-rank matrix. We will first consider the case where the set S is bounded, so that there are no directions of unboundedness and d = 0. Let x ∈ S be any feasible point. If x is an extreme point, then x = vi for some i and the theorem is true with αi = 1 and αj = 0 for j = i. If x is not an extreme point, then, by the results in the last section, x is not a basic feasible solution. Hence the columns of A corresponding to the nonzero entries are linearly dependent and we can find a feasible direction p, that is, a vector p = 0 satisfying Ap = 0 pi = 0 if xi = 0. If  is small in magnitude, A(x + p) = b x + p ≥ 0 (x + p)i = 0

if xi = 0.

Hence x + p ∈ S. Since S is bounded, as  increases in magnitude (either positive or negative) eventually points are encountered where some additional component of x + p becomes zero. Let y1 be the point obtained with  > 0 and y2 be the point obtained with  < 0. Then x is a convex combination of y1 and y2 and both y1 and y2 have at least one more zero component than x does; see the Exercises.

i

i i

i

i

i

i

4.4. Representation of Solutions; Optimality

book 2008/10/23 page 121 i

121

The argument is now completed by induction. If y1 and y2 are both extreme points, then we are finished. Otherwise, the same reasoning is applied as necessary to one or both of y1 and y2 to express them as convex combinations of points with one more zero component. This is repeated until eventually a representation is obtained in terms of extreme points. (There is one detail that must be checked: it must be shown that if y1 and y2 are convex combinations of extreme points, then so is x; see the Exercises.) This argument also shows that the set of extreme points is nonempty. Because the number of nonzero components is decreasing by one at each step, and is bounded below by 0, eventually the points generated by this scheme must be basic feasible solutions, that is, extreme points. The unbounded case is proved similarly. Choose x ∈ S. If x is not an extreme point we can form x + p for a vector p chosen as before. However, it is possible that either p or −p is a direction of unboundedness if either p ≥ 0 or p ≤ 0, respectively. (They cannot both be directions of unboundedness because of the nonnegativity constraints x ≥ 0; see the Exercises.) Suppose that p is a direction of unboundedness, so a move in the direction −p will hit the boundary at some point y2 , that is, x − γp = y2 with γ > 0. (Analogous remarks apply if −p is a direction of unboundedness.) Then x = d + 1 · y2 , where d = γp for some γ , so that x is the sum of a direction of unboundedness and a (trivial) convex combination of y2 . As before, y2 has at least one more zero entry than x does. Now the same argument can be applied inductively to y2 to show that it can be expressed as a convex combination of extreme points plus a nonnegative linear combination of directions of unboundedness with nonnegative coefficients. Since such a combination of directions of unboundedness is again a direction of unboundedness (see the Exercises), this completes the proof. So far our main concern has been the constraints in a linear program. We now examine the objective function and show that a solution to a linear program, if one exists, can always be chosen from among the extreme points of the feasible region. Theorem 4.7. If a linear program in standard form has a finite optimal solution, then it has an optimal basic feasible solution. Proof. Let x be a finite optimal solution for the linear program represented in standard form. Using the representation theorem we can write x as x=d+

k

αi v i ,

i=1

where k

αi = 1

and

αi ≥ 0,

i = 1, . . . , k.

i=1

As before { vi } is the set of extreme points of the feasible region, and d is either zero or a

i

i i

i

i

i

i

122

book 2008/10/23 page 122 i

Chapter 4. Geometry of Linear Programming

direction of unboundedness. The objective function has the value cTx = cTd +

k

α i c T vi .

i=1

We first show that cTd = 0. If cTd < 0, then the objective function is unbounded below, since it is straightforward to verify that xγ = γ d +

k

αi v i

i=1

will be feasible for any γ > 0 and cT(γ d) = γ cTd will be unbounded below as γ increases. This in turn implies that cTxγ is unbounded below. Since x was assumed to be a finite optimal solution, this is a contradiction and so cTd ≥ 0. Now if cTd > 0, then cTx > cTy where y=

k

α i vi

i=1

is a feasible point. This shows that x would not be optimal in this case. Hence cTd = 0 and cTx = cTy, showing that y is also an optimal solution.

Now pick an index j for which cTvj = mini cTvi . Then for any convex combination of the vi ’s, cTy =

k

α i c T vi ≥

i=1

= c T vj

k

αi c T v j

i=1 k

α i = c T vj .

i=1

Since y is optimal it must be true that cTy = cTvj , showing that there is an optimal extreme point, namely vj , or equivalently an optimal basic feasible solution. One of the conditions for an optimal solution is that the objective function cannot decrease if we move in any feasible direction. Consider the linear program from Section 4.1: minimize subject to

z = −x1 − 2x2 −2x1 + x2 ≤ 2 −x1 + x2 ≤ 3 x1 ≤ 3 x1 , x2 ≥ 0.

If we select the optimal point x = (3, 6)T and move some small distance  > 0 in the feasible direction d = (−2, −3)T, then cT(x + d) = cTx + cTd = −15 + 8 > −15, so that the objective function increases in this direction.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 123 i

123

We can also represent this idea algebraically. Suppose that we have a linear program in standard form minimize z = cTx subject to Ax = b x ≥ 0, and that x is an optimal basic feasible solution. If p is a feasible direction, then x + p must be feasible for small  > 0. In addition, because x is optimal, cT(x + p) ≥ cTx. Hence p must satisfy cTp ≥ 0 Ap = 0 pi ≥ 0 if xi = 0. We will use these conditions when deriving the simplex method in the next chapter.

Exercises 4.1. Let x be a feasible point for the constraints Ax = b,

x≥0

that is not an extreme point. Prove that there exists a vector p = 0 satisfying Ap = 0 pi = 0 if xi = 0. 4.2. Let x be an element of a convex set S. Assume that x1 = x + 1 p ∈ S and x2 = x − 2 p ∈ S, where p = 0 and 1 , 2 > 0. Prove that x is a convex combination of x1 and x2 . That is, prove that x = αx1 + (1 − α)x2 , where 0 < α < 1, and determine the value of α. 4.3. Let x be a convex combination of { y1 , . . . , yk }. Assume in turn that each yi is a , . . . , yi,ki . Prove that x is a convex combination of convex combination of y i,1

the vectors yi,j . 4.4. Let p be a direction of unboundedness for the constraints Ax = b,

x ≥ 0.

Prove that −p cannot be a direction of unboundedness for these constraints. 4.5. Let { d1 , . . . , dk } be directions of unboundedness for the constraints Ax = b, Prove that d=

k

α i di

x ≥ 0. with αi ≥ 0

i=1

is also a direction of unboundedness for these constraints.

i

i i

i

i

i

i

124

book 2008/10/23 page 124 i

Chapter 4. Geometry of Linear Programming

4.6. Consider the linear program minimize subject to

z = 2x1 − 3x2 4x1 + 3x2 ≤ 12 x1 − 2x2 ≤ 2 x1 , x2 ≥ 0.

Represent the point x = (1, 1)T as a convex combination of extreme points plus, if applicable, a direction of unboundedness. Find three different representations. 4.7. Consider the linear program minimize subject to

z = 3x1 + x2 x1 − x2 ≥ 2 −2x1 + x2 ≤ 4 x1 , x2 ≥ 0.

Represent the point x = (5, 2)T as a convex combination of extreme points plus, if applicable, a direction of unboundedness. Find three different representations. 4.8. Suppose that a linear program with bounded feasible region has  optimal extreme points v1 , . . . , v . Prove that a point is optimal for the linear program if and only if it can be expressed as a convex combination of { vi }. 4.9. Complete the proof of Theorem 4.6 in the case where S is bounded by showing that x is a convex combination of y1 and y2 .

4.5

Notes

The material in this chapter is well known and is discussed in a number of books on linear programming such as the books of Dantzig (1963, reprinted 1998), Chvátal (1983), Murty (1983), and Schrijver (1986, reprinted 1998).

i

i i

i

i

i

i

book 2008/10/23 page 125 i

Chapter 5

The Simplex Method

5.1

Introduction

The simplex method is the most widely used method for linear programming and one of the most widely used of all numerical algorithms. It was developed in the 1940’s at the same time as linear programming models came to be used for economic and military planning. It had competitors at that time, but these competitors could not match the efficiency of the simplex method and they were soon discarded. Even as problems have become larger and computers more powerful, the simplex method has been able to adapt and remain the method of choice for many people. It is only in recent years with the development of interior-point methods (see Chapter 10) that the simplex method has had a serious challenge for primacy in the realm of linear programming. Even though the simplex method only solves linear programming problems, its techniques are of more general interest. The same techniques can be used to handle linear constraints in nonlinear optimization problems and can be generalized to handle nonlinear constraints. This is discussed in Chapter 15. The ways that constraints are represented are used in other settings, as are the methods for computing Lagrange multipliers (dual variables; see Chapter 6). Our study of the simplex method will also provide a good setting for discussing degeneracy and a number of other topics. The simplex method has important historic ties to economics, and this has influenced the terminology associated with the method. For example, it is common to speak of reduced “costs” and shadow “prices.” For many applications these terms are useful and suggestive of the interpretations that will be given to the linear programming model. In this chapter we describe the basic form of the simplex method. We apply the method to a linear program in standard form, show how to find an initial feasible point, and adapt the simplex method to solve degenerate problems. Our emphasis will be on the general properties of the method. The details that make up a modern implementation of the method are delayed until Chapter 7. The results of Chapter 4 provide the major motivation for the simplex method. We proved that if a linear program has a finite optimal solution, then it has an optimal basic feasible solution. This implies that we need only examine basic feasible solutions to solve a linear program. The simplex method is a systematic and effective way to do just this. 125

i

i i

i

i

i

i

126

book 2008/10/23 page 126 i

Chapter 5. The Simplex Method

5.2 The Simplex Method The simplex method is an iterative method for solving a linear programming problem written in standard form. When applied to nondegenerate problems, it moves from one basic feasible solution (extreme point) to another. The simplex method is an example of a feasible-point method (see Section 3.1). What distinguishes the simplex method from a general feasiblepoint method is that every estimate of the solution is a basic feasible solution. At each iteration the method tests to see if the current basis is optimal. If it is not, the method selects a feasible direction along which the objective function improves and moves to an adjacent basic feasible solution along that direction. Then everything repeats. Here we present the simplex method using explicit matrix inverses. Modern computer implementations of the simplex method do not do this, but rather use matrix factorizations and related techniques (see Section 7.5). The main reason is that explicit matrix inverses are not suitable for sparse problems. However, many important ideas about linear programming and about the simplex method can be explained without reference to the specific representation of the inverse matrix. The simplex method will be illustrated using the linear program minimize subject to

z = −x1 − 2x2 −2x1 + x2 ≤ 2 −x1 + 2x2 ≤ 7 x1 ≤ 3 x1 , x2 ≥ 0.

Slack variables are added to put it in standard form: minimize subject to

z = −x1 − 2x2 − 2x1 + x2 + x3 − x1 + 2x2 + x4 x1 + x5 x1 , x2 , x3 , x4 , x5

=2 =7 =3 ≥ 0.

As usual, we denote the objective function by z = cTx and the constraints by Ax = b, with x ≥ 0. The feasible region for the original form of the problem is illustrated in Figure 5.1. In this problem each of the constraints has a slack variable. This makes it easy to find a basic feasible solution, that is, xB = (x3 , x4 , x5 )T and xN = (x1 , x2 )T. The coefficient matrix associated with a complete set of slack variables will always be the identity matrix I , whose columns are linearly independent. Since the nonbasic variables will be zero, the basic variables will satisfy I xB = xB = b. In standard form the right-hand side b will be nonnegative, so x ≥ 0 and is feasible. For this example, the initial basic feasible solution is ( x1

x2

x3

x4

x5 )T = ( 0

0

2

7

3 )T .

This corresponds to the extreme point xa in Figure 5.1.

i

i i

i

i

i

i

5.2. The Simplex Method

book 2008/10/23 page 127 i

127

x2 6 5 4

xf

xd

xc

3

xb 2 1

xa -7

-6

-5

-4

-3

-2

-1

xe 1

2

3

4

x1

Figure 5.1. The simplex method. We now test if this point is optimal. To do this, we determine if there exist any feasible descent directions. The constraints can be written with the basic variables expressed in terms of the nonbasic variables: x3 = 2 + 2x1 − x2 x4 = 7 + x1 − 2x2 x5 = 3 − x 1 . All other feasible points can be found by varying the values of the nonbasic variables x1 and x2 and using the constraints to determine the values of the basic variables x3 , x4 , and x5 . Because the nonbasic variables are currently zero and all variables must be nonnegative, it is only valid to increase a nonbasic variable so that it becomes positive. Our goal is to minimize the objective function z = −x1 − 2x2 , and its current value is z = 0. If either x1 or x2 is increased from zero, then z will decrease. This shows that nearby feasible points obtained by increasing either x1 or x2 give lower values of the objective function, so that the current basis is not optimal. The simplex method moves from one basis to an adjacent basis, deleting and adding just one variable from the basis. This corresponds to moving between adjacent basic feasible solutions. In geometric terms, the simplex method moves along edges of the feasible region. It is not difficult to calculate how the objective function changes along an edge of the feasible region, and this contributes to the simplicity of the method. For this example, moving to an adjacent basic feasible solution corresponds to increasing either x1 or x2 , but not both. The coefficient of x2 is greater in absolute value than the coefficient of x1 , so z decreases more rapidly when x2 is increased. In the hope of making more rapid progress toward the solution, we choose to increase x2 rather than x1 .

i

i i

i

i

i

i

128

book 2008/10/23 page 128 i

Chapter 5. The Simplex Method

Every unit increase of x2 decreases the objective value by two, so the more x2 is increased, the better the value of the objective. However, the value of x2 cannot be increased indefinitely because the region is bounded. The constraint equations show that as x2 increases and x1 is kept fixed at zero, x3 = 2 − x2 and x4 = 7 − 2x2 decrease but x5 = 3 is unaffected. To maintain nonnegativity of the variables, x2 can be increased only until one of x3 or x4 becomes zero. The first constraint shows that x3 = 0 when x2 = 2 (and x4 = 3 > 0); this corresponds to the point xb in Figure 5.1. The second constraint shows that x4 = 0 when x2 = 72 (and x3 = − 32 < 0); this corresponds to the infeasible point xf in the figure. Consequently x2 can only be increased to the value x2 = 2. At this point x3 becomes zero and leaves the basis, and x2 has entered the basis. The new basic feasible solution is xb : ( x1

x2

x3

x4

x5 ) T = ( 0

2

0

3

3 )T ,

where xB = (x2 , x4 , x5 )T and xN = (x1 , x3 )T. The final step in the iteration is to make the transition to the new basic feasible solution. One way to do this is to rewrite the problem so that the new basic variables are expressed in terms of the new nonbasic variables. We want only the nonbasic variables to appear in the objective, and we want the coefficient matrix for the basic variables in the equality constraints to be the identity matrix. Writing the constraints in this way will allow us to repeat the same analysis at the new basic feasible solution. It will make it easy to determine if the current basis is optimal, and if not, how the basis can be changed to improve the value of the objective. Since x2 is replacing x3 in the basis, we use the first constraint (the one that defines x3 in terms of the other variables) to express x2 in terms of the nonbasic variables x1 and x3 : x2 = 2 + 2x1 − x3 . We then use this equation to make substitutions for x2 in the remaining constraints and the objective function. After simplification the linear program has the form minimize z = −4 − 5x1 + 2x3 subject to the constraints x2 = 2 + 2x1 − x3 x4 = 3 − 3x1 + 2x3 x5 = 3 − x 1 and with all variables nonnegative. Since x1 = x3 = 0 the current objective value is z = −4 and the basic variables have the values x2 = 2, x4 = 3, and x5 = 3. This completes one iteration of the simplex method. We can now begin again by testing for optimality, examining how the objective changes when we increase the nonbasic variables from zero. This basic feasible solution is not optimal and we can improve the objective by increasing x1 . And so forth. At each iteration, we identify a nonbasic variable that can improve the objective (if one exists). This variable is increased until some basic variable decreases to zero. This gives a new basic feasible solution, and the process repeats. For this example, the simplex method moves from xa to xb to xc to xd , the optimal point. We will go through the remaining iterations in Example 5.2.

i

i i

i

i

i

i

5.2. The Simplex Method

5.2.1

book 2008/10/23 page 129 i

129

General Formulas

Let us now consider a general linear program and derive general formulas for the steps in the simplex method. Assume that the problem has n variables and m linearly independent equality constraints. We derive the formulas in matrix-vector form for the linear program minimize

z = cTx

subject to

Ax = b x ≥ 0.

Let x be a basic feasible solution with the variables ordered so that   xB x= , xN where xB is the vector of basic variables and xN is the (currently zero) vector of nonbasic variables. The objective function can be written as z = cBT xB + cNT xN , where the coefficients for the basic variables are in cB and the coefficients for the nonbasic variables are in cN . Similarly, we write the constraints as BxB + N xN = b. The constraints can be rewritten as xB = B −1 b − B −1 N xN . By varying the values of the nonbasic variables we can obtain all possible solutions to Ax = b. If this formula is substituted into the formula for z, we obtain z = cBT B −1 b + (cNT − cBT B −1 N )xN . If we define y = (cBT B −1 )T = B −T cB , then z can be written as z = y Tb + (cNT − y TN )xN . This formula is efficient computationally. The vector y is the vector of simplex multipliers. The current values of the basic variables and the objective are obtained by setting xN = 0. We denote these by xB = bˆ = B −1 b and zˆ = cBT B −1 b. Example 5.1 (General Formulas). For our sample linear program,  A=

−2 1 1 0 0 −1 2 0 1 0 1 0 0 0 1

 ,

  2 b= 7 , 3



and

⎞ −1 ⎜ −2 ⎟ ⎜ ⎟ c = ⎜ 0⎟. ⎝ ⎠ 0 0

i

i i

i

i

i

i

130

Chapter 5. The Simplex Method

If xB = (x1 , x2 , x3 )T and xN = (x4 , x5 )T, then ⎛   0 0 −2 1 1 1 B = −1 2 0 , B −1 = ⎝ 0 2 1 0 0 1 − 12

1 1 2 3 2





⎠,

N=

0 1 0

0 0 1

book 2008/10/23 page 130 i

 ,

cBT = (−1, −2, 0), and cNT = (0, 0). The current values of the variables are xB = bˆ = B

−1

  3 b= 5 3

and xN = (0, 0)T. The objective value is zˆ = cBT B −1 b = −13. If we define

y T = cBT B −1 = ( 0

−1

−2 ) ,

then the objective value could also be computed as zˆ = y Tb = −13. If xN = 0, then the general formula for the basic variables is   ⎛ 0 1⎞  3 1 1 x4 , xB = B −1 b − B −1 N xN = 5 − ⎝ 2 2 ⎠ x 5 1 3 3 −2 2 and the general formula for the objective value is  z = y Tb + (cNT − y TN )xN = −13 + ( 1

2)

x4 x5

 .

Let cˆj be the entry in the vector cˆNT ≡ (cNT − cBT B −1 N ) corresponding to xj . The coefficient cˆj is called the reduced cost of xj . Then z = zˆ + cˆNT xN . (In Example 5.1, cˆ4 = 1 and cˆ5 = 2.) If the nonbasic variable xj is assigned some nonzero value , then the objective function will change by cˆj . To test for optimality we examine what would happen to the objective function if each of the nonbasic variables were increased from zero. If cˆj > 0 the objective function will increase, if cˆj = 0 the objective will not change, and if cˆj < 0 the objective will decrease. Hence if cˆj < 0 for some j , then the objective function can be improved if xj is increased from zero. If the current basis is not optimal, then a variable xt with cˆt < 0 can be selected to enter the basis. Once the entering variable xt has been selected, we must then determine how much it can be increased before a nonnegativity constraint is violated. This determines which variable (if any) will leave the basis. The basic variables are defined by xB = B −1 b − B −1 N xN ,

i

i i

i

i

i

i

5.2. The Simplex Method

book 2008/10/23 page 131 i

131

and, with the exception of xt , all components of xN are zero. Thus xB = bˆ − Aˆ t xt , where Aˆ t is the vector B −1 At and At is the tth column of A. We examine this equation componentwise: (xB )i = bˆi − aˆ i,t xt . If aˆ i,t > 0, then (xB )i will decrease as the entering variable xt increases, and (xB )i will equal zero when xt = bˆi /aˆ i,t . If aˆ i,t < 0, then (xB )i will increase, and if aˆ i,t = 0, then (xB )i will remain unchanged. The variable xt can be increased as long as all the variables remain nonnegative, that is, until it reaches the value   bˆi x¯t = min : aˆ i,t > 0 . 1≤i≤m aˆ i,t This is a ratio test (see Section 3.1), but of an especially simple form. The minimum ratio from the ratio test identifies the new nonbasic variable, and hence determines the new basic feasible solution, with xt as the new basic variable. The formulas xB ← xB − Aˆ t x¯t

and

zˆ ← zˆ + cˆt x¯t

can be used to determine the new values of the objective function and the basic variables in the current basis. The variable xt is assigned the value x¯t ; the remaining nonbasic variables are still zero. If aˆ i,t ≤ 0 for all values of i, then none of the basic variables will decrease in value as xt is increased from zero, and so xt can be made arbitrarily large. In this case, the objective function will decrease without bound as xt → ∞, indicating that the linear program does not have a finite minimum. Such a problem is said to be “unbounded.” We can now outline the simplex algorithm. The method starts with a basis matrix B corresponding to a basic feasible solution xB = bˆ = B −1 b ≥ 0. The steps of the algorithm are given below. 1. The Optimality Test—Compute the vector y T = cBT B −1 . Compute the coefficients cˆNT = cNT − y TN . If cˆNT ≥ 0, then the current basis is optimal. Otherwise, select a variable xt that satisfies cˆt < 0 as the entering variable. 2. The Step—Compute Aˆ t = B −1 At , the constraint coefficients corresponding to the entering variable. Find an index s that satisfies   bˆs bˆi = min : aˆ i,t > 0 . 1≤i≤m aˆ s,t aˆ i,t This ratio test determines the leaving variable and the “pivot entry” aˆ s,t . If aˆ i,t ≤ 0 for all i, then the problem is unbounded. 3. The Update—Update the basis matrix B and the vector of basic variables xB .

i

i i

i

i

i

i

132

book 2008/10/23 page 132 i

Chapter 5. The Simplex Method

The optimality test is a local test since it only involves the reduced costs in the current basis. Since linear programming problems are convex optimization problems, however, any local solution is also a global solution. (See Section 2.3.) Thus this test identifies a global solution to a linear program. Example 5.2 (Simplex Algorithm). We will illustrate the simplex method on our example linear program: ⎛ ⎞ −1     −2 1 1 0 0 2 ⎜ −2 ⎟ ⎜ ⎟ A = −1 2 0 1 0 , b = 7 , and c = ⎜ 0 ⎟ . ⎝ ⎠ 1 0 0 0 1 3 0 0 If we use the slack variables as the initial basis, then xB = (x3 , x4 , x5 )T, xN = (x1 , x2 )T, B = I = B −1 , cBT = (0, 0, 0), cNT = (−1, −2), and   −2 1 N = −1 2 . 1 0 Thus xB = bˆ = B −1 b = (2, 7, 3)T. With this basis y T = cBT B −1 = ( 0

0

0)

and

cˆNT = cNT − y TN = ( −1

−2 ) .

Both components of cˆN are negative, so this basis is not optimal. Since (cˆN )2 is the more negative component, we select x2 (the second nonbasic variable) as the entering variable. For the ratio test we compute the entering column   1 −1 Aˆ 2 = B A2 = 2 , 0 so that the ratios (corresponding to the first two components of Aˆ 2 ) are bˆ1 =2 aˆ 1,2

and

bˆ2 7 = . aˆ 2,2 2

The first ratio is smaller, so x3 (the first basic variable) is the variable that leaves the basis. At the next iteration x2 replaces x3 in the basis, so that xB = (x2 , x4 , x5 )T, xN = (x1 , x3 )T,       1 0 0 −2 1 1 0 0 B = 2 1 0 , B −1 = −2 1 0 , N = −1 0 , 0 0 1 1 0 0 0 1 cBT = (−2, 0, 0), and cNT = (−1, 0). Thus xB = bˆ = B −1 b = ( 2 3 3 )T y T = cBT B −1 = ( −2 0 0 ) cˆNT = cNT − y TN = ( −5 2 ) .

i

i i

i

i

i

i

5.2. The Simplex Method

book 2008/10/23 page 133 i

133

The first reduced cost is negative, so this basis is not optimal, and x1 (the first nonbasic variable) is the entering variable. The entering column is   −2 Aˆ 1 = B −1 A1 = 3 1 and the candidate ratios are bˆ2 /aˆ 2,1 = 1 and bˆ3 /aˆ 3,1 = 3, so that x4 (the second basic variable) is the leaving variable. At the third iteration xB = (x2 , x1 , x5 )T, xN = (x3 , x4 )T, ⎛ 1 ⎞ 2     0 −3 3 1 −2 0 1 0 ⎜ ⎟ 1 B = 2 −1 0 , B −1 = ⎝ − 23 0⎠, N = 0 1 , 3 0 1 1 0 0 2 1 − 1 3

3

cB = (−2, −1, 0), and cN = (0, 0). Then T

T

xB = bˆ = B −1 b = ( 4 1 2 )T y T = cBT B −1 = ( 34 − 53 0 ) cˆNT = cNT − y TN = ( − 43 53 ) . This basis is not optimal and x3 is the entering variable. The entering column is ⎛ 1⎞ −3 ⎜ 2⎟ −1 ˆ A3 = B A3 = ⎝ − ⎠ 3 2 3

and the only candidate ratio is bˆ3 /aˆ 3,1 = 3, so x5 is the leaving variable. At the fourth iteration, xB = (x2 , x1 , x3 )T, xN = (x4 , x5 )T, ⎛ 1 1 ⎞    0 1 −2 1 0 2 2 −1 B = 2 −1 0 , B = ⎝ 0 0 1⎠, N = 1 0 1 0 0 1 −1 3 2

2

0 0 1

 ,

cB = (−2, −1, 0), and cN = (0, 0). Then T

T

xB = bˆ = B −1 b = ( 5

3

3 )T

−1

y = cB B = ( 0 −1 −2 ) cˆNT = cNT − y TN = ( 1 2 ) . T

T

This basis is optimal. In the optimality test of the simplex method there is an ambiguity about the choice of the entering variable. In the example, we selected the entering variable corresponding to the most negative cˆj < 0. If xj is increased by , then z will change by cˆj , so this choice achieves the best rate of decrease in z. This choice does not take into account the results of the ratio test, so it is possible that only a tiny step will be taken and that z will only

i

i i

i

i

i

i

134

book 2008/10/23 page 134 i

Chapter 5. The Simplex Method

decrease by a small amount. It also does not take into account the scaling of the variables in the problem. Other more sophisticated ways of choosing the entering variable are possible, but they may require additional computations and can be more expensive to use. They are discussed in Section 7.6.1. Had we chosen x1 to enter the basis at the first iteration, the method would have moved from xa through xe to the optimal point xd , requiring only two iterations; see Figure 5.1. For general problems, however, there is no practical way to predict which choice of entering variable would lead to the least number of iterations.

5.2.2

Unbounded Problems

In step 2 of the simplex method there is the possibility that the problem will be unbounded. If aˆ i,t > 0, then basic variable (xB )i will decrease as the entering variable xt increases, and (xB )i will equal zero when xt = bˆi /aˆ i,t . If aˆ i,t ≤ 0 for all i, then none of the basic variables will decrease as xt increases, implying that xt can be increased without bound, and hence the feasible region is unbounded. The objective function will change by an amount equal to cˆt xt as xt increases. Since the entering variable was chosen because cˆt < 0, the objective function can be decreased indefinitely. Thus the linear program will not have a finite minimum value. Unboundedness is illustrated in the following example. Example 5.3 (Unbounded Linear Program). Consider the linear program minimize subject to

z = −x1 − 2x2 −x1 + x2 ≤ 2 −2x1 + x2 ≤ 1 x1 , x2 ≥ 0.

After two iterations, the basis is xB = (x1 , x2 )T with xN = (x3 , x4 )T,     −1 1 1 −1 and B −1 = . B= −2 1 2 −1 At this iteration, xB = (1, 3)T and the reduced costs for the nonbasic variables are cˆNT = (5, −3), so the current basis is not optimal, and x4 (the second nonbasic variable) is the entering variable. The entering column is   −1 ˆ , A4 = −1 so there are no candidates for the ratio test. The entering variable x4 can be increased without limit, so the objective function can be decreased without limit, and there is no finite solution to this linear program. This can also be seen by looking at a graph of the feasible region; see Figure 5.2. (The figure represents the two-variable version of the problem, not the problem in standard form.) The current basic feasible solution is (x1 , x2 , x3 , x4 )T = (1, 3, 0, 0)T. From the equation xB = bˆ − Aˆ 4 x4 we conclude that all points of the form ⎛ ⎞ ⎛ ⎞ ⎛ ⎞ 1 x1 1 ⎜ x2 ⎟ ⎜ 3 ⎟ ⎜ 1 ⎟ ⎝ ⎠ = ⎝ ⎠ + ⎝ ⎠ x4 x3 0 0 x4 0 1

i

i i

i

i

i

i

5.2. The Simplex Method

book 2008/10/23 page 135 i

135

3 2 1

-3

-2

-1

1

2

3

Figure 5.2. Unbounded linear program. are feasible. Let d = (1, 1, 0, 1)T. It is easy to check that d ≥ 0 and Ad = 0, where   −1 1 1 0 A= −2 1 0 1 is the coefficient matrix for the constraints of the problem in standard form. Hence d is a direction of unboundedness. Since cTd < 0, the objective decreases as x4 is increased, showing that the problem is unbounded. In this example it would have been possible to stop at the first iteration. Our rule for choosing the entering variable picked x2 to enter the basis, but any variable xj with cˆj < 0 can be the entering variable since such a variable will lead to an improvement in the objective function. If x1 were chosen as the entering variable, then the entering column would be   −1 ˆ , A1 = −2 and there would be no candidates for the ratio test, again indicating that the problem is unbounded. At the first iteration, all points of the form ⎛ ⎞ ⎛ ⎞ ⎛ ⎞ x1 0 1 ⎜ x2 ⎟ ⎜ 0 ⎟ ⎜ 0 ⎟ ⎝ ⎠ = ⎝ ⎠ + ⎝ ⎠ x1 x3 2 1 x4 1 2 are feasible, where d = (1, 0, 1, 2)T is a direction of unboundedness along which the objective decreases.

5.2.3

Notation for the Simplex Method (Tableaus)

Although we have presented the formulas for the simplex method already, these formulas are not always convenient for classroom and explanatory use because they require the calculation of matrix inverses or solving systems of equations. (If software is available for performing the necessary matrix calculations, however, they are satisfactory.) In this section we present a notational device called a “tableau” for representing the calculations in the simplex method. The tableau uses the inverse of the basis matrix, but updates it at every

i

i i

i

i

i

i

136

book 2008/10/23 page 136 i

Chapter 5. The Simplex Method

iteration of the simplex method, rather than calculating it anew. This makes it possible to solve small linear programs “by hand.” The tableau is also a convenient and compact format to present examples. For this reason we will sometimes use tableaus to discuss examples. To understand our examples it is only necessary to be able to extract information from the tableaus, not to manipulate them. We emphasize that the tableaus (and the use of explicit matrix inverses) are merely notational devices that assist our explanations of the simplex method. Computer implementations of the simplex method use other techniques more suitable for large sparse problems (see Chapter 7). For our example minimize z = −x1 − 2x2 subject to − 2x1 + x2 + x3 = 2 − x1 + 2x2 + x4 = 7 x1 + x5 = 3 x1 , x2 , x3 , x4 , x5 ≥ 0 the initial tableau looks like basic

x1

x2

x3

x4

x5

rhs

−z

−1

−2

0

0

0

0

x3 x4 x5

−2 −1 1

1 2 0

1 0 0

0 1 0

0 0 1

2 7 3

The lower part of the tableau contains the coefficients of the constraints of the linear program in standard form. For example, the last row corresponds to the third constraint x1 + x5 = 3. The top row of the tableau contains the coefficients in the objective function. It corresponds to writing the objective function in the form of an equality constraint −z − x1 − 2x2 + 0x3 + 0x4 + 0x5 = 0, where the right-hand side is the negative of the current value of the objective function. To emphasize that the objective value is multiplied by −1, the top row of the tableau is labeled −z. The first column of the tableau lists the basic variables and the column labeled “rhs” for “right-hand side” records the values of −z and the basic variables. (The nonbasic variables are zero.) We will again solve the example problem, this time using the tableau. Because the initial basis matrix is B = I , the entries in the lower part of the “rhs” column are xB = bˆ = B −1 b and the entries in the top row are the current reduced costs c. ˆ At every iteration, the entries in the tableau will be represented in terms of the current basis, so that the “rhs” column will include bˆ and the top row will include c. ˆ Before proceeding with the example, we give the general formulas for the tableau. Consider a linear program in standard form with n variables and m equality constraints. Let us assume that at the current iteration the vectors of basic and nonbasic variables are xB = (x1 , . . . , xm )T and xN = (xm+1 , . . . , xn )T, respectively.

i

i i

i

i

i

i

5.2. The Simplex Method

book 2008/10/23 page 137 i

137

The original linear program corresponds to the tableau basic

xB

xN

rhs

−z

cBT

cNT

0

xB

B

N

b

and the tableau for the problem in the current basis is basic

xB

xN

rhs

−z

0

cNT − cBT B −1 N

−cBT B −1 b

xB

I

B −1 N

B −1 b

These are the matrix-vector formulas for the tableau. The simplex iteration begins with the optimality test. For the basic variables the reduced costs are zero. In our example, at the first iteration the reduced costs for the nonbasic variables are negative, so the current basis is not optimal. The reduced cost for x2 is larger in magnitude, so we select x2 as the entering variable. We determine the leaving variable using the ratio test. The ratios are computed using the “rhs” values and the values in the entering column, where the ratio is computed only if the coefficient of the entering variable is positive. The smallest nonnegative ratio will correspond to the leaving variable. In the tableau, only the first two constraint coefficients for x2 are greater than zero, giving the ratios 2/1 = 2 and 7/2 = 72 . Hence, x3 is the leaving variable. In the tableau we mark the entering variable as well as the pivot entry in the x2 column and the x3 row: basic

x1

⇓ x2

x3

x4

x5

rhs

−z

−1

−2

0

0

0

0

x3 x4 x5

−2 −1 1

1 2 0

1 0 0

0 1 0

0 0 1

2 7 3

The final step is to transform the tableau to express the coefficients in terms of the new basis. This step is sometimes called pivoting. This can be done using the matrix-vector formulas for the tableau using the new basis. It can also be done directly from the tableau by applying elementary row operations to transform the x2 column into ⎛ ⎞ 0 ⎜1⎟ ⎝ ⎠, 0 0 that is, into a column of the identity matrix with a one as the pivot entry and zeroes elsewhere. The result of this transformation is that the new basic variables are represented in terms of the new nonbasic variables.

i

i i

i

i

i

i

138

book 2008/10/23 page 138 i

Chapter 5. The Simplex Method

In this case we add 2 times the x3 row to the −z row, and subtract 2 times the x3 row from the x4 row to obtain the new tableau: basic

x1

x2

x3

x4

x5

rhs

−z

−5

0

2

0

0

4

x2 x4 x5

−2 3 1

1 0 0

1 −2 0

0 1 0

0 0 1

2 3 3

Notice that the “basic” column has been modified to reflect the change in the basis. This is the tableau corresponding to the transformed linear program at the basic feasible solution xb that we derived earlier. We now perform the second iteration of the simplex method. In the top row of the tableau the reduced cost of x1 is −5 < 0, so this basis is not optimal and x1 will be the entering variable. The ratio test indicates that x4 will leave the basis:

basic

⇓ x1

x2

x3

x4

x5

rhs

−z

−5

0

2

0

0

4

x2 x4 x5

−2 3 1

1 0 0

1 −2 0

0 1 0

0 0 1

2 3 3

We then apply elimination operations to get the next tableau. The tableaus for the remaining iterations are ⇓ basic x1 x2 x3 x4 x5 rhs −z

0

0

− 43

5 3

0

9

x2

0

1

− 13

2 3 1 3 − 13

0

4

0

1

1

2

x1

1

0

x5

0

0

− 23 2 3

basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

1

2

13

x2 x1 x3

0 1 0

1 0 0

0 0 1

1 2

1 2

0 − 12

1

5 3 3

and

3 2

i

i i

i

i

i

i

5.2. The Simplex Method

book 2008/10/23 page 139 i

139

At the fourth iteration the reduced costs of the nonbasic variables are all positive, so the current basis is optimal. The solution can be read from the “rhs” column of the tableau: z = −13, x2 = 5, x1 = 3, and x3 = 3. The nonbasic variables, x4 and x5 , are zero. This is the same as in Section 5.2.

5.2.4

Deficiencies of the Tableau

In the tableau form of the simplex method, many of the computations performed in a given iteration are not used in that iteration. For example, the tableau columns of all nonbasic variables are computed, even though only the column of the entering variable is needed in order to determine the new solution. Implementations of the simplex method generate at each iteration only the information that is specifically required for that iteration. The result is a version of the method which requires less storage and less computation. It also makes it possible to utilize the sparsity of the matrix A to reduce the number of computations. Historically this approach was named the revised simplex method to distinguish it from the tableau form. The version of the simplex method presented in Section 5.2.1 is of this type. Here we discuss some of the advantages of this approach. As before, we work with a problem in standard form minimize

z = cTx

subject to

Ax = b x ≥ 0,

where A is an m × n matrix of full row rank. Let B be the basis matrix at some iteration. In matrix-vector notation, the current tableau is basic

xB

xN

rhs

−z

0

cNT − cBT B −1 N

−cBT B −1 b

xB

I

B −1 N

B −1 b

The information required for the simplex method can be generated directly from B −1 and the original data. This allows us to compute information only as needed. More specifically, suppose that some representation of the m × m inverse of a basis matrix for some iteration is available. Then the only other information that would be needed at that iteration is the current solution vector, the reduced costs, and the column of the entering variable. This information may be computed from the formulas for the method. If the basis matrix inverse B −1 is available, then xB = bˆ = B −1 b and the associated objective value is zˆ = cBT B −1 b = cBT xB . The columns of the current tableau, Aˆ j , are obtained from Aˆ j = B −1 Aj ,

i

i i

i

i

i

i

140

book 2008/10/23 page 140 i

Chapter 5. The Simplex Method

where Aj is the j th column of A. If we define y T = cBT B −1 , we can compute the reduced costs from cˆj = cj − y TAj . The process of computing the coefficients cˆj is called pricing. Some mechanism is needed to update the representation of the inverse matrix for the next iteration. The inverse could be computed anew at every iteration, but more efficient techniques are discussed in Chapter 7. We can be more precise about the computational differences between the simplex method via formulas and via the tableau. The simplex method, whether implemented using the formulas from Section 5.2.1 or using the tableau, will go through the same sequence of bases, provided that the same criteria are used for selecting the entering variable and for breaking ties in selecting the leaving variable. Thus, on a given problem the two versions perform the same number of iterations. The difference between the versions of the method is in the organization of the computation. In the following we compare the formulas with the tableau for a problem in standard form with m constraints and n variables. Consider first the storage requirements, beyond those required for storing the problem itself. The tableau requires an (m + 1) × (n + 1) array. The formulas require • an array of length m to store the value of xB , • an array of length m to store the entering column, • an array of length n − m to store the reduced costs, and • a representation of B −1 . If B −1 is represented explicitly, then an m × m array is required. If B is a sparse matrix, then its inverse can typically be represented using storage proportional to the number of nonzero entries in B. Thus if n is much larger than m (as is frequently the case), the formulas achieve significant savings in storage requirements as compared to the tableau. Consider now the computational effort required by the two approaches. One measure of this effort is the number of operations required per iteration. For simplicity we shall only count the number of multiplications and divisions. The number of additions and subtractions is roughly the same. We start by examining the work required to solve a dense problem. The main computational effort in the tableau method is in pivoting. Each pivot updates n − m + 1 tableau columns, corresponding to the (n − m) nonbasic variables plus the righthand-side vector. First, the pivot row is divided by the pivot term; this requires n − m + 1 operations. Next, a multiple of the updated pivot row is added to each of the remaining m rows (including the top row); this requires m(n − m + 1) multiplications. In total, each pivot requires (n − m + 1) + m(n − m + 1) = mn + n + 1 − m2 multiplications. The only other calculations occur in the ratio test, where at most m divisions are performed. The effort in the ratio test is negligible compared to the effort in pivoting, and for simplicity we shall ignore it.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 141 i

141

The computational effort in an iteration with the formulas includes: computation of cˆj (pricing); computation of the entering column; the ratio test; and the update. Each computation cˆj = cj − y TAj requires m multiplications in the inner product. Since there are n − m nonbasic variables, pricing will require m(n − m) multiplications. Computing the entering column Aˆt involves a matrix-vector product B −1 At , or m2 multiplications. In the update step, the representation of B −1 must be updated, along with the reduced costs and the value of xB . If Gaussian elimination is used to do this (see Section 7.5), then the cost is m + 1 multiplications per row, or a total cost of (m + 1)2 . Summing up (and again ignoring the cost of the ratio test), we conclude that the formula-based simplex method requires m(n − m) + m2 + (m + 1)2 = mn + (m + 1)2 multiplications per iteration. It appears that unless n is substantially larger than m, the tableau method will require less computation. However, our operation count has not taken into account the effects of sparsity. To examine this, consider for example a sparse problem, where each column of A has exactly 5 nonzero elements. Then, if we are using the formulas, each inner product y TAj will now only require 5 multiplications, hence full pricing will require 5(n − m) multiplications. The matrix-vector product B −1 At will require 5m multiplications. The update step will still require (m + 1)2 operations. In total, the number of operations will be 5(n − m) + 5m + (m + 1)2 = 5n + (m + 1)2 . In contrast, the tableau will still require the number of computations given above. When m and n are large, the savings offered by the revised simplex method are dramatic. For example, if m = 1000 and n = 100,000, then each iteration of the tableau simplex method will require about 99 million operations, while each iteration of the formula-based simplex method will only require about 1.5 million operations. Such savings might reduce the total solution time from days to just hours, or from hours to just minutes. In the operation count, we assumed that B −1 is dense. This is often the case, even when the matrix B is sparse. Thus, if m is large the (m + 1)2 operations required to update a dense matrix B −1 may become expensive. In Chapter 7 we describe a variant of the simplex method that represents B −1 as a product of factors which tend to be sparse. This can further reduce the work and storage required by the simplex method.

Exercises 2.1. Verify the computational results in Example 5.2. 2.2. Solve the following linear programs using the simplex method. If the problem is two dimensional, graph the feasible region, and outline the progress of the algorithm. (i) minimize subject to

z = −5x1 − 7x2 − 12x3 + x4 2x1 + 3x2 + 2x3 + x4 ≤ 38 3x1 + 2x2 + 4x3 − x4 ≤ 55 x1 , x2 , x3 , x4 ≥ 0.

i

i i

i

i

i

i

142

book 2008/10/23 page 142 i

Chapter 5. The Simplex Method (ii) maximize subject to

z = 5x1 + 3x2 + 2x3 4x1 + 5x2 + 2x3 + x4 ≤ 20 3x1 + 4x2 − x3 + x4 ≤ 30 x1 , x2 , x3 , x4 ≥ 0.

(iii) z = 3x1 + 9x2 −5x1 + 2x2 ≤ 30 −3x1 + x2 ≤ 12 x1 , x2 ≥ 0.

minimize subject to

(iv) minimize subject to

z = 3x1 − 2x2 − 4x3 4x1 + 5x2 − 2x3 ≤ 22 x1 − 2x2 + x3 ≤ 30 x1 , x2 , x3 ≥ 0

(v) maximize subject to

z = 7x1 + 8x2 4x1 + x2 ≤ 100 x1 + x2 ≤ 80 x1 ≤ 40 x1 , x2 ≥ 0

(vi) minimize subject to

z = −6x1 − 14x2 − 13x3 x1 + 4x2 + 2x3 ≤ 48 x1 + 2x2 + 4x3 ≤ 60 x1 , x2 , x3 ≥ 0.

. 2.3. Consider the linear program minimize subject to

z = x1 − x2 −x1 + x2 ≤ 1 x1 − 2x2 ≤ 2 x1 , x2 ≥ 0.

Derive an expression for the set of optimal solutions to this problem, and show that this set is unbounded. 2.4. Find all the values of the parameter a such that the following linear program has a finite optimal solution: minimize subject to

z = −ax1 + 4x2 + 5x3 − 3x4 2x1 + x2 − 7x3 − x4 = 2 x1 , x2 , x3 , x4 ≥ 0.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 143 i

143

2.5. Using the optimality test to find all the values of the parameter a such that x∗ = (0, 1, 1, 3, 0, 0)T is the optimal solution of the following linear program: minimize subject to

z = −x1 − a 2 x2 + 2x3 − 2ax4 − 5x5 + 10x6 − 2x1 − x2 + x4 + 2x6 = 2 2x1 + x2 + x3 = 2 − 2x1 − x3 + x4 + 2x5 = 2 x1 , x2 , x3 , x4 , x5 , x6 ≥ 0.

2.6. The reduced costs are given by the formula cˆNT = cNT − cBT B −1 N , and a basic feasible solution is optimal if cˆNT ≥ 0. Construct an example involving a degenerate basic feasible solution that corresponds to two different bases, where in one basis the basic feasible solution is optimal, but in the other basis it is not. 2.7. Prove that the set of optimal solutions to a linear programming problem is a convex set. 2.8. Prove that in the simplex method a variable which has just left the basis cannot re-enter the basis in the following iteration. 2.9. Consider the linear program minimize subject to

z = cTx Ax ≤ b x ≥ 0,

where x = (x1 , . . . , xn )T, c = (0, . . . , 0, −α)T, b = (1, . . . , 1)T, and ⎛ ⎞ 1 ⎜ −2 ⎟ 1 ⎜ ⎟ ⎜ ⎟. −2 1 A=⎜ ⎟ .. .. ⎝ ⎠ . . −2 1 Here α is small positive number, say α = 2−50 . (i) Consider the basic feasible solution where the slacks are the basic variables. Compute the reduced costs for this basis. By how much does this basis violate the optimality conditions? What is the current value of the objective? (ii) Consider now the solution where { x1 , . . . , xn } is the set of basic variables. Prove that this is a basic feasible solution. (iii) Prove that the solution defined in (ii) is optimal. (iv) What is the optimal objective value? (Find a closed-form solution, if possible.) 2.10. Consider a linear program with a single constraint minimize

z = c1 x1 + c2 x2 + · · · + cn xn

subject to

a 1 x1 + a 2 x2 + · · · + a n xn ≤ b x1 , x2 , . . . , xn ≥ 0.

(i) Under what conditions is the problem feasible? (ii) Develop a simple rule to determine an optimal solution, if one exists.

i

i i

i

i

i

i

144

book 2008/10/23 page 144 i

Chapter 5. The Simplex Method

2.11. Solve the linear programs in Exercise 2.2 using the tableau. 2.12. This problem concerns the number of additions/subtractions in the various versions of the simplex method for a problem with n variables and m < n equality constraints. (i) Compute the number of additions/subtractions required in each iteration of the tableau version of the simplex method. (ii) Compute the number of additions/subtractions required in each iteration of the Simplex method implemented using the formulas in Section 5.2.4. (iii) Assume now that each column of the constraint matrix has l < m nonzero entries. Repeat part (ii). 2.13. The following tableau corresponds to an iteration of the simplex method: basic

x1

x2

x3

x4

x5

x6

rhs

−z

0

a

0

b

c

3

d

0 1 0

−2 g 0

1 0 0

e −2 h

0 0 1

2 1 4

f 1 3

Find conditions on the parameters a, b, . . . , h so that the following statements are true. (i) (ii) (iii) (iv) (v)

The current basis is optimal. The current basis is the unique optimal basis. The current basis is optimal but alternative optimal bases exist. The problem is unbounded. The current solution will improve if x4 is increased. When x4 is entered into the basis, the change in the objective is zero.

5.3 The Simplex Method (Details) In Section 5.2, a general discussion of the simplex method was given, and a small linear program was solved, but this does not give a complete description of the method. For example, it was not shown how to initialize the method, and there were no guarantees that it would terminate. The rest of this chapter will fill some of these gaps. In this section, we show how to detect if the linear program has multiple solutions. In Section 5.4, techniques for initializing the simplex method are described. And in Section 5.5, we give conditions under which the simplex method will be guaranteed to terminate when applied to any linear program.

5.3.1

Multiple Solutions

A linear program can have more than one optimal solution. This can occur when the reduced cost of a nonbasic variable is equal to zero in the optimal basis.

i

i i

i

i

i

i

5.3. The Simplex Method (Details)

book 2008/10/23 page 145 i

145

Example 5.4 (Multiple Solutions). Consider the linear program minimize subject to

z = −x1 −2x1 + x2 ≤ 2 −x1 + x2 ≤ 3 x1 ≤ 3 x1 , x2 ≥ 0.

After one iteration of the simplex method, basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

0

1

3

x3 x4 x1

0 0 1

1 1 0

1 0 0

0 1 0

2 1 1

8 6 3

This basis is optimal, but the reduced cost for the nonbasic variable x2 is zero. This indicates that if this variable entered the basis, then the objective would change by cˆ2 × (new value of x2 ) = 0, so the objective value would not be altered and would remain optimal. If we perform this update we obtain basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

0

1

3

x3 x2 x1

0 0 1

0 1 0

1 0 0

−1 1 0

1 1 1

2 6 3

This basis is also optimal, and again the reduced cost of a nonbasic variable (x4 ) is zero. This problem has two optimal basic feasible solutions. Any convex combination of these two solutions is also optimal. These points correspond to an edge of the feasible region. This is illustrated in Figure 5.3.

5.3.2

Feasible Directions and Edge Directions

The simplex method is an example of a feasible point method. It moves from one extreme point to another along a sequence of feasible descent directions. For nondegenerate linear programs, these directions correspond to edges of the feasible region. We can determine formulas for the feasible directions in the simplex method. Let A = (B, N ) be the constraint matrix, and let  −1  B b xˆ = 0

i

i i

i

i

i

i

146

book 2008/10/23 page 146 i

Chapter 5. The Simplex Method 6 5 4 3 2 1

-3

-2

-1

1

2

3

Figure 5.3. Multiple solutions. be the corresponding basic feasible solution. (It may be necessary to reorder the variables, with the basic variables listed first.) Any feasible point can be represented as     −1 B b − B −1 N xN xB = x= xN xN   −1   −B −1 N B b + xN = 0 I = xˆ + ZxN for some nonnegative value of xN . The matrix   −B −1 N Z= I is the null-space matrix for A obtained via variable reduction with this basis. Alternatively, following the discussion in Section 3.1, x may be written as xˆ + p where p is a feasible direction. Since A(xˆ + p) = b

and

xˆ + p ≥ 0,

it follows that Ap = 0

and

pN ≥ 0.

Hence p is in the null space of A and can be written as p = Zv for some v. Comparing this with the result above shows that we can set v = pN = xN . Any nonnegative choice of xN will correspond to a feasible direction. In the simplex method, only one nonbasic variable is allowed to enter the basis at a time. This implies that only one component of xN will be nonzero during an update. In turn, this implies that the feasible directions considered at an iteration of the simplex method are the columns of Z. If (xN )k is the entering variable and Zk is the kth column of Z, then an

i

i i

i

i

i

i

5.3. The Simplex Method (Details)

book 2008/10/23 page 147 i

147

update step in the simplex method corresponds to a step of the form x = xˆ + (xN )k Zk . The edges of the feasible region at the point xˆ are the nonnegative points x that can be written in this form, and the vectors Zk are called edge directions. The step in the simplex method is of the form xˆ + αp for a search direction p = Zk and a step length α = (xN )k , and so the simplex method fits into the framework of our general optimization algorithm. If some column Zi of Z satisfies Zi ≥ 0, then d = Zi is a direction of unboundedness for the problem. It is easy to verify that Ad = 0 and d ≥ 0, i.e., that the conditions for a direction of unboundedness are satisfied. Example 5.5 (Feasible Directions and Edge Directions). We look again at the linear program minimize z = −x1 − 2x2 subject to − 2x1 + x2 ≤ 2 − x1 + 2x2 ≤ 7 x1 ≤ 3 x1 , x2 ≥ 0. Its feasible region is depicted in Figure 5.1. At the first iteration xˆ = xa = (0, 0, 2, 7, 3)T. The basic and nonbasic variables are xB = (x3 , x4 , x5 )T and xN = (x1 , x2 )T, respectively. The corresponding null-space matrix is  Z=

I −B −1 N



⎛ ⎜ =⎜ ⎝



I  −

1 0 0

0 1 0

0 0 1

−1 

−2 −1 1



1 0 ⎜ ⎟ = ⎜ 2 1 ⎟ ⎜ ⎠ ⎝ 1 2 −1 0

⎞ 0 1⎟ ⎟ −1 ⎟ . ⎠ −2 0

At this iteration, x2 entered the basis. This is the second nonbasic variable and so the feasible direction is p = Z2 = ( 0

1

−1

−2

0 )T .

The step procedure determines that the new value of x2 is 2, and hence the step length is α = 2. The new basic feasible solution can be written as x = xˆ + αp = ( 0 0 2 7 3 )T + 2 ( 0 = ( 0 2 0 3 3 )T .

1

−1

−2

0 )T

It would also have been possible to take a step in the feasible direction p = Z1 . Both Z1 and Z2 are edge directions. They correspond to the edges connecting xa to xe and xa to xb in Figure 5.1.

i

i i

i

i

i

i

148

book 2008/10/23 page 148 i

Chapter 5. The Simplex Method The null-space matrix Z can also be used to derive a formula for the reduced costs:   −B −1 N T T T c Z = ( cB cN ) I = −cBT B −1 N + cNT = cNT − cBT B −1 N.

Thus the reduced cost of the kth nonbasic variable is just cTZk .

Exercises 3.1. Consider the linear program minimize subject to

z = −x1 + 2x2 − x3 x1 + 2x2 + x3 ≤ 12 2x1 + x2 − x3 ≤ 6 − x1 + 3x2 ≤ 9 x1 , x2 , x3 ≥ 0.

Add slack variables x4 , x5 , and x6 to put the problem in standard form. (i) Consider the basis { x1 , x4 , x6 }. Use the formulas for the simplex method to represent the linear program in terms of this basis. (ii) Perform an iteration of the simplex method, constructing the null-space matrix Z, and computing the search direction d and the step length α so that xk+1 = xk + αd, where xk is the current vector of variables and xk+1 is the new vector of variables. 3.2. Derive an expression for the family of optimal solutions to the linear program in Example 5.5. 3.3. At each iteration of the simplex method xk+1 = xk + αp. Determine α and p for each iteration in the solution of the linear program from Section 5.2: minimize subject to

z = −x1 − 2x2 −2x1 + x2 ≤ 2 −x1 + 2x2 ≤ 7 x1 ≤ 3 x1 , x2 ≥ 0

and verify that Ap = 0 where A is the coefficient matrix for the equality constraints in the problem. 3.4. Suppose that the optimal solution to a linear program has been found, and a reduced cost associated with a nonbasic variable is zero. Must the linear program have multiple solutions? Explain your answer. 3.5. Let xˆ be an optimal basic feasible solution to a linear program in standard form with m × n constraint matrix A of full row rank. Let Z be the null-space matrix for A obtained via variable reduction using the basis corresponding to x. ˆ Suppose that

i

i i

i

i

i

i

5.4. Getting Started—Artificial Variables

book 2008/10/23 page 149 i

149

cTZk = 0 for k = 1, . . . ,  ≤ n − m, where Zk is the kth column of Z and c is the vector of objective coefficients. Show that every nonnegative vector x = xˆ +



αj Z j

j =1

is also optimal for the linear program.

5.4

Getting Started—Artificial Variables

The simplex method moves from one basic feasible solution to another until either a solution is found or until it is determined that the problem is unbounded. In the example in Section 5.2, an initial basic feasible solution was obtained by choosing the slack variables as a basis. In problems where every constraint has a slack variable this will always be a valid choice. General problems will not have this property, raising the question of how to find a basic feasible solution. Sometimes the person posing the problem will be able to provide one. In cases where a sequence of similar linear programs is solved, such as a weekly budget prediction where the data vary slightly from week to week, the optimal basis from the previous linear program may be feasible for the new linear program. Or, say, if the linear program is designed to optimize the operations of a factory, the current setup at the factory may represent a basic feasible solution. The use of a specified initial basis was illustrated in Example 5.1. This still leaves problems for which no obvious initial feasible point is available. One could guess at a basis but there is no guarantee that it would correspond to a point that satisfied the nonnegativity constraints. Randomly trying one basis after another until a basic feasible solution is found can be time consuming; if the problem were infeasible, every basis would have to be examined before this could be concluded. When no initial point is provided, some general technique for getting started is required. We describe two standard approaches. The first (called the two-phase method) solves an auxiliary linear program to find an initial basic feasible solution. The second (called the big-M method) adds terms to the objective function that penalize for infeasibility. Although these are usually considered to be two separate approaches for finding a feasible point, they are closely related. They both use artificial variables as an algorithmic device, and in fact the two-phase method is the limit of the big-M method as the magnitude of the penalty goes to infinity. There are differences, however, in the way in which these methods are implemented in software, and for this reason it is worthwhile to consider them separately. We will study these approaches using the following example: minimize subject to

z = 2x1 + 3x2 3x1 + 2x2 = 14 2x1 − 4x2 ≥ 2 4x1 + 3x2 ≤ 19 x1 , x2 ≥ 0.

i

i i

i

i

i

i

150

book 2008/10/23 page 150 i

Chapter 5. The Simplex Method

In standard form this becomes z = 2x1 + 3x2 3x1 + 2x2 = 14 2x1 − 4x2 − x3 = 2 4x1 + 3x2 + x4 = 19 x1 , x2 , x3 , x4 ≥ 0.

minimize subject to

The first constraint contains no obvious candidate for a basic variable. The second constraint contains an excess variable, but if it were a basic variable it would take on the infeasible value −2 < 0. Only the third constraint has a slack variable suitable as a member of the initial basis. Both initialization techniques use the device of artificial variables, that is, extra variables that are temporarily added to the problem. An artificial variable is added to every constraint that does not contain a slack variable: minimize subject to

z = 2x1 + 3x2 3x1 + 2x2 + a1 = 14 2x1 − 4x2 − x3 + a2 = 2 4x1 + 3x2 + x4 = 19 x1 , x2 , x3 , x4 , a1 , a2 ≥ 0.

Now it is possible to initialize the simplex method using xB = (a1 , a2 , x4 )T with values a1 = 14, a2 = 2, and x4 = 19. This choice of xB has coefficient matrix B that is a permutation of the identity matrix I . Since the artificial variables are not part of the original problem, this choice of basis does not correspond to a basic feasible solution to the original problem; it is not even feasible for the original problem. The methods discussed below try to move to a basic feasible solution which does not include artificial variables. If this is possible, then the new basis will only include variables from the original problem and will represent a feasible point for the linear program. If the artificial variables cannot be driven to zero, then the constraints for the original problem are infeasible and the problem has no solution.

5.4.1 The Two-Phase Method In the two-phase method the artificial variables are used to create an auxiliary linear program, called the phase-1 problem, whose only purpose is to determine a basic feasible solution for the original set of constraints. The objective function for the phase-1 problem is minimize z =



ai ,

i

where { ai } are the artificial variables. For our example z = a1 + a2 . The constraints for the phase-1 problem are the constraints of the original problem put in standard form, with artificial variables added as necessary. If the constraints for the original linear program are feasible, then the phase-1 problem will have optimal value z∗ = 0. If the original constraints are infeasible, then z∗ > 0.

i

i i

i

i

i

i

5.4. Getting Started—Artificial Variables

book 2008/10/23 page 151 i

151

We will illustrate this approach using the tableau. The tableau for the problem with artificial variables is basic

x1

x2

x3

x4

a1

a2

rhs

−z

0

0

0

0

1

1

0

a1 a2 x4

3 2 4

2 −4 3

0 −1 0

0 0 1

1 0 0

0 1 0

14 2 19

The top-row entries for a1 and a2 are not zero, so z is not expressed only in terms of the nonbasic variables. If we write the linear program in terms of the current basis, we obtain basic

x1

x2

x3

x4

a1

a2

rhs

−z

−5

2

1

0

0

0

−16

a1 a2 x4

3 2 4

2 −4 3

0 −1 0

0 0 1

1 0 0

0 1 0

14 2 19

This transformation is necessary whenever the entries for the initial basic variables are not zero; it can be performed using the general formulas for the simplex method or by using elimination within the tableau. If we use the general formulas, the reduced costs for the nonbasic variables are    0 0 1 3 2 0 T T −1 cN − cB B N = ( 0 0 0 ) − ( 0 1 1 ) 1 0 0 2 −4 −1 0 1 0 4 3 0 = ( −5 2 1 ) . The reduced costs for the basic variables are zero. Also, the objective value for the initial basis is obtained either via elimination or from the formula −z = −cBT B −1 b. At the first iteration, the reduced cost for x1 is negative so this basis is not optimal. The ratio test indicates that a2 is the leaving variable. We would like to remove a2 from the problem completely. The artificial variables were added to constraints where there was no obvious choice for a basic variable. In the current basis x1 serves that function for the second constraint, and a2 is no longer required. For this reason a2 (or any other artificial variable that has left the basis) can be removed from the problem. The new basic solution is basic

x1

⇓ x2

x3

x4

a1

rhs

0

0

−11

−z

0

−8

− 32

a1

0

8

0

1

11

x1 x4

1

−2

3 2 − 12

0

0

1

0

11

2

1

0

15

i

i i

i

i

i

i

152

book 2008/10/23 page 152 i

Chapter 5. The Simplex Method

At iteration 2 the reduced costs for x2 and x3 are negative, so this basis is not optimal. Since the coefficient of x2 is larger in magnitude, x2 will be selected as the entering variable. Then x4 is the leaving variable. After pivoting we obtain

basic

x1

x2

⇓ x3

x4

a1

rhs

−z

0

0

1 − 22

8 11

0

1 − 11

a1

0

0

8 − 11

1

x1

1

0

0

1

2 11 1 11

0

x2

1 22 3 − 22 2 11

1 11 41 11 15 11

0

At iteration 3 the reduced cost for x3 is negative so this basis is not optimal and x3 is the entering variable. The ratio test shows that a1 is the leaving variable. Pivoting (and removing the a1 column because it is irrelevant) gives the new tableau: basic

x1

x2

x3

x4

rhs



0

0

0

0

0

x3 x1 x2

0 1 0

0 0 1

1 0 0

−16 −2 3

2 4 1

−z

The current basis does not involve any artificial variables and the objective value is zero, so this is a feasible point for the constraints of the original problem. The solution of the phase-1 problem only gives a basic feasible solution for the original problem; it is not optimal. It can be used as an initial basic feasible solution for the original problem with objective z = 2x1 +3x2 . This is called the phase-2 problem, with the following data: basic

x1

x2

x3

x4

rhs

−z

2

3

0

0

0

x3 x1 x2

0 1 0

0 0 1

1 0 0

−16 −2 3

2 4 1

If the simplex method is implemented without a tableau, then all that is necessary is to retain the final basis from the phase-1 problem as the initial basis of the phase-2 problem.

i

i i

i

i

i

i

5.4. Getting Started—Artificial Variables

book 2008/10/23 page 153 i

153

The reduced costs for the basic variables x1 and x2 are not zero, so the problem must be expressed in standard form before the simplex method can be used. If we represent the linear program in terms of the current basis, we obtain

basic

x1

x2

x3

⇓ x4

rhs

−z

0

0

0

−5

−11

x3 x1 x2

0 1 0

0 0 1

1 0 0

−16 −2 3

2 4 1

The reduced cost for x4 is negative so this basis is not optimal. Only x2 is a candidate for the ratio test, so it is the leaving variable. Pivoting gives basic

x1

x2

x3

x4

rhs

−z

0

5 3

0

0

− 28 3

x3

0

1

0

x1

1

0

0

x4

0

16 3 2 3 1 3

0

1

22 3 14 3 1 3

This basis is optimal. Much of the time, the two-phase method will work as indicated. The phase-1 problem will be set up and solved via the simplex method. If the constraints for the original problem have a basic feasible solution, at the end of phase 1 the artificial variables will all be nonbasic, and the final basis from phase 1 can be used as an initial basis for the original linear program. However, there are several exceptional cases that can arise at the end of phase 1, all associated with artificial variables remaining in the basis. We will discuss these using examples. These exceptional cases occur in an analogous way when a big-M approach is used; see the Exercises. In the following examples, intermediate results of the simplex method are omitted so we can focus on the exceptional cases. Example 5.6 (Infeasible Problem). Consider the linear program minimize subject to

z = −x1 x1 + x2 ≥ 6 2x1 + 3x2 ≤ 4 x1 , x2 ≥ 0.

An artificial variable will be used in the first constraint; the second constraint will have a slack variable and so will not need an artificial variable. The optimal phase-1 basic solution is

i

i i

i

i

i

i

154

book 2008/10/23 page 154 i

Chapter 5. The Simplex Method 6 5 4 3 2 1

-3

-2

-1

1

2

3

4

5

6

Figure 5.4. Infeasible problem.

basic

x1

x2

x3

x4

a1

rhs

−z

0

1 2

1

1 2

0

−4

a1

0

−1

4

1

− 12 1 2

1

x1

− 12 3 2

0

2

0

The objective function is nonzero, and the artificial variable is still in the basis with value a1 = 4 > 0. There is no solution to the phase-1 problem that has a1 = 0, indicating that there is no feasible solution to the constraints. This can be seen from Figure 5.4. In the next example an artificial variable remains in the basis at the end of phase 1, but with value 0, and the phase-1 objective function also has value 0. In this case a basic feasible solution has been found, but additional update steps are required to remove the artificial variables from the basis before phase 2 can begin. Example 5.7 (Removing Artificial Variables). Consider the linear program minimize subject to

z = x1 + x2 2x1 + x2 + x3 = 4 x1 + x2 + 2x3 = 2 x1 , x2 , x3 ≥ 0.

If artificial variables are added to both equations, and x1 replaces a2 in the basis at the first iteration, then the optimal phase-1 basic solution is basic

x1

x2

x3

a1

rhs

−z

0

1

3

0

0

a1 x1

0 1

−1 1

−3 2

1 0

0 2

The value of the objective function is zero, and the point (x1 , x2 , x3 )T = (2, 0, 0)T is a feasible point for the original set of constraints. However, the artificial variable a1 is still in the basis so it is not possible to proceed with phase 2, since an appropriate basis for the original problem has not yet been found.

i

i i

i

i

i

i

5.4. Getting Started—Artificial Variables

book 2008/10/23 page 155 i

155

At the current point the values of the variables are ( x1

x2

x3

a 1 )T = ( 2

0

0

0 )T

and so there are three possible choices of basis that would lead to the same solution (assuming that the corresponding coefficient matrices are of full rank): { x1 , x2 }, { x1 , x3 }, and { x1 , a1 }. The last involves an artificial variable and is not of interest. If { x1 , x2 } is selected as the basis, then basic

x1

x2

x3

a1

rhs

−z

0

0

0

1

0

x2 x1

0 1

1 0

3 −1

−1 1

0 2

This basis is optimal for the phase-1 problem. If { x1 , x3 } is selected, then basic

x1

x2

x3

a1

rhs

−z

0

0

0

1

0

x3

0

1

1

− 31 2 3

0

x1

1 3 1 3

0

2

This basis is also optimal for the phase-1 problem. In both these cases it is now possible to proceed with phase 2. For both of these choices we ignored the usual rules for the simplex method. The reduced costs for the entering variables were positive, and the rules for the ratio test were violated. It was only possible to do this because the artificial variable was zero. The purpose here was to find a feasible basis that did not include artificial variables, having found a solution to the phase-1 problem with objective value zero. We were only interested in changing the way the solution was represented, that is, in changing the basis to an equivalent one. There is a general rule for cases where the phase-1 problem has optimal value zero but the final basis includes artificial variables equal to zero. If the ith basic variable is a zero-valued artificial variable, then it can be replaced in the basis by any nonbasic variable xj from the original linear program for which aˆ i,j = 0. The final example is a linear program with linearly dependent constraints. We have assumed up to now that such constraints would be removed. This example shows what can happen if they are not. Example 5.8 (Linearly Dependent Constraints). Consider the linear program minimize subject to

z = x1 + 2x2 x1 + x2 = 2 2x1 + 2x2 = 4 x1 , x2 ≥ 0.

i

i i

i

i

i

i

156

book 2008/10/23 page 156 i

Chapter 5. The Simplex Method

The second constraint is twice the first constraint. If artificial variables are added, and x1 replaces a1 in the basis at the first iteration, we obtain the optimal phase-1 basis basic

x1

x2

a2

rhs



0

0

0

0

x1 a2

1 0

1 0

0 1

2 0

−z

This basis is optimal with objective value zero, but the artificial variable a2 is still in the basis. It is not possible to choose the basis { x1 , x2 } because the entry in column x2 and row a2 is zero, so it cannot be a pivot entry. To resolve the difficulty we look more carefully at the last row of the tableau. It corresponds to the equation a2 = 0. Since this equation has no influence on the original problem it can be removed (together with the a2 column), leaving the reduced problem basic

x1

x2

rhs



0

0

0

x1

1

1

2

−z

This basis can now be used to start phase 2. If the second constraint had been removed from the problem to begin with, we would have obtained the same result. This is another case where the phase-1 problem has optimal value zero but the final basis includes artificial variables equal to zero. In general, if the ith basic variable is a zero-valued artificial variable and if aˆ i,j = 0 for every variable xj from the original linear program, then the constraints in the original program must have been linearly dependent. On a computer it can be difficult to identify linear dependence. Small rounding errors will be introduced making it unlikely that any computed value will be exactly zero. It is then necessary to decide if a small number should be considered to be zero. A wrong decision can lead to a dramatic change in the solution to the linear program. This topic is discussed further in Chapter 7.

5.4.2 The Big-M Method In the Big-M method penalty terms are added to the objective function that are designed to push artificial variables out of the basis. We will again use the example minimize subject to

z = 2x1 + 3x2 3x1 + 2x2 = 14 2x1 − 4x2 ≥ 2 4x1 + 3x2 ≤ 19 x1 , x2 ≥ 0

i

i i

i

i

i

i

5.4. Getting Started—Artificial Variables

book 2008/10/23 page 157 i

157

to illustrate the method. As before, the problem is put in standard form and artificial variables are added. But in this case, instead of setting up an auxiliary phase-1 problem, the objective function will be changed to minimize z = 2x1 + 3x2 + Ma1 + Ma2 , where M is a symbol representing some large positive number. In general, there will be one penalty term for each artificial variable. For pencil-and-paper calculations M is left as a symbol and no specific value is given for it. In a computer calculation M would be set large enough to dominate all other numbers arising during the solution of the linear program. If M is large, then any basis that includes a positive artificial variable will lead to a large positive value of the objective function z . If there is any basic feasible solution to the constraints of the original linear program, then the corresponding basis will not include any artificial variables and its objective value will be much smaller. Because the artificial variables have a high cost associated with them, the simplex method will eventually remove them from the basis if this is at all possible. Any basic feasible solution to the penalized problem in which all the artificial variables are nonbasic (and hence zero) is also a basic feasible solution to the original problem. The corresponding basis can be used as an initial basis for the original problem. The objective function in the phase-1 problem can be obtained as a limit of the objective function in the big-M method. The big-M method has objective function z = c T x + M



ai .

i

This is equivalent to using the objective zˆ = M −1 cTx +



ai .

i

Taking the limit as M → ∞ gives the phase-1 objective. As a consequence, the tableaus for the phase-1 problem will only differ from the big-M tableaus in the top row. For this reason we will go through the simplex method for the example more quickly than we did when examining the two-phase method. In our example, the initial basis for the penalized problem with artificial variables gives basic

x1

x2

x3

x4

a1

a2

rhs

−z

2

3

0

0

M

M

0

a1 a2 x4

3 2 4

2 −4 3

0 −1 0

0 0 1

1 0 0

0 1 0

14 2 19

As before, the reduced costs for the artificial variables are not zero and the problem must

i

i i

i

i

i

i

158

book 2008/10/23 page 158 i

Chapter 5. The Simplex Method

be written in terms of the current basis: basic

⇓ x1

x2

x3

x4

a1

a2

rhs

−z

−5M + 2

2M + 3

M

0

0

0

−16M

a1 a2 x4

3 2 4

2 −4 3

0 −1 0

0 0 1

1 0 0

0 1 0

14 2 19

At the first iteration, x1 is the entering variable and a2 is the leaving variable. As in the two-phase method, once an artificial variable leaves the basis it becomes irrelevant and can be removed from the problem. After pivoting (and removing a2 ), we obtain the basic solution basic

⇓ x2

x1

x3

x4

a1

rhs

+1

0

0

−11M − 2

0

1

11

−2

3 2 − 12

11

2

0 1

0 0

1 15



0

−8M + 7

a1

0

8

x1 x4

1 0

−z

− 32 M

At iteration 2, x2 is the entering variable, and x4 is the leaving variable. After pivoting we obtain basic

x1

x2

⇓ x3

x4

a1

rhs

−z

0

0

− M+6 22

8M−7 11

0

− M+127 11

a1

0

0

8 − 11

1

x1

1

0

0

1

2 11 1 11

0

x2

1 22 3 − 22 2 11

1 11 41 11 15 11

0

At iteration 3, x3 is the entering variable and a1 is the leaving variable. After pivoting (and removing the a1 column because it is irrelevant) we obtain the new basic solution:

basic

x1

x2

x3

⇓ x4

rhs



0

0

0

−5

−11

x3 x1 x2

0 1 0

0 0 1

1 0 0

−16 −2 3

2 4 1

−z

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 159 i

159

The current basis does not involve any artificial variables, so this is a feasible point for the original problem. With the artificial variables gone, the objective function is now that of the original linear program. At iteration 4 the reduced cost for x4 is negative so this basis is not optimal. In the column for x4 , x2 is the only possible exiting variable. Pivoting gives basic

x1

x2

x3

x4

rhs

−z

0

5 3

0

0

− 28 3

x3

0

1

0

x1

1

0

0

x4

0

16 3 2 3 1 3

0

1

22 3 14 3 1 3

This basis is optimal. As expected, it is the same as the optimal basis obtained using the two-phase method. In a software implementation it can be challenging to select an appropriate value for the penalty M. M must be large enough to dominate the other values in the problem, but if it is too large it can introduce serious computational errors through rounding. This topic is discussed further in Section 16.3.

Exercises 4.1. Use the simplex method (via a phase-1 problem) to find a basic feasible solution to the following system of linear inequalities: 2x1 − 3x2 + 2x3 ≥ 3 −x1 + x2 + x3 ≥ 5 x1 , x2 , x3 ≥ 0. 4.2. Solve the problem minimize subject to

z = −4x1 − 2x2 − 8x3 2x1 − x2 + 3x3 ≤ 30 x1 + 2x2 + 4x3 = 40 x1 , x2 , x3 ≥ 0,

using (a) the two-phase method; (b) the big-M method. 4.3. Solve the problem minimize z = −4x1 − 2x2 subject to 3x1 − 2x2 ≥ 4 − 2x1 + x2 = 2 x1 , x2 , ≥ 0, using (a) the two-phase method; (b) the big-M method.

i

i i

i

i

i

i

160

book 2008/10/23 page 160 i

Chapter 5. The Simplex Method

4.4. Solve the following problem using the two-phase or big-M method: minimize subject to

z = 2x1 − 2x2 − x3 − 2x4 + 3x5 − 2x1 + x2 − x3 − x4 = 1 x1 − x2 + 2x3 + x4 + x5 = 4 −x1 + x2 − x5 = 4 x1 , x2 , x3 , x4 , x5 ≥ 0.

4.5. Consider the phase-1 problem for a linear program with the constraints x1 x2 x1 + 2x2 x1 , x2

≥5 ≥1 ≥4 ≥ 0.

Consider the following sequence of points (x1 , x2 )T:             5 5 4 2 0 0 . , and , , , , 1 0 0 1 1 0 Show that these points could correspond to successive basic feasible solutions if the simplex method were applied to the phase-1 problem. Hence show that it is possible for artificial variables to leave and then re-enter the basis if they are retained throughout the solution of the phase-1 problem. 4.6. Apply the big-M method to the linear programs in Examples 5.7, 5.8, and 5.9. 4.7. The following are the final phase-1 basic solutions for four different linear programming problems. In each problem a1 and a2 are the artificial variables for the two constraints, and the objective of each of the problems is minimize z = x1 + x2 + x3 . For each of the problems, determine whether the problem is feasible; and if it is feasible, find the initial basis for phase 2 and write the linear program in terms of that basis. (i) basic

x1

x2

x3

a1

a2

rhs



0

0

0

1

1

0

3 2

0 1

1 0

−1 0

2 1

0 5

basic

x1

x2

x3

a1

a2

rhs



1

0

1

0

0

0

3 −1

1 0

0 −1

0 1

1 1

2 0

−z

(ii) −z

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 161 i

161

(iii) basic

x1

x2

x3

a1

a2

rhs

−z

0

1

2

0

0

−1

0 1

1 3

−2 4

−3 1

1 0

1 3

basic

x1

x2

x3

a1

a2

rhs



0

0

0

3

0

0

1 0

2 0

12 0

1 −2

0 1

3 0

(iv) −z

4.8. The following is the final basic solution for phase 1 in a linear programming problem, where a1 and a2 are the artificial variables for the two constraints: basic

x1

x2

x3

x4

x5

a1

a2

rhs

−z

0

a

0

0

b

c

1

d

−2 e

0 f

4 g

1 0

0 h

0 i

−2 1

1 j

Find conditions on the parameters a, b, c, d, e, f , g, h, i, and j such that the following statements are true. You need not mention those parameters that can take on arbitrary positive or negative values. You should attempt to find the most general conditions possible. (i) A basic feasible solution to the original problem has been found. (ii) The problem is infeasible. (iii) The problem is feasible but some artificial variables are still in the basis. However, by performing update operations a basic feasible solution to the original problem can be found. (iv) The problem is feasible but it has a redundant constraint. (v) For the case a = 4, b = 1, c = 0, d = 0, e = 0, f = −4, g = 0, h = −1, i = 1, and j = 0, determine whether the system is feasible. If so, find an initial basic solution for phase 2. Assume that the objective is to minimize z = x 1 + x4 . 4.9. Consider the linear programming problem minimize

z = cTx

subject to

Ax = b x ≥ 0.

i

i i

i

i

i

i

162

book 2008/10/23 page 162 i

Chapter 5. The Simplex Method

Let a1 , . . . , am be the artificial variables, and suppose that at the end of phase 1 a basic feasible solution to the problem has been found (no artificial variables are in the basis). Prove that, in the final phase-1 basis, the reduced costs are zero for the original variables x1 , . . . , xn and are one for the artificial variables. 4.10. Describe how you would use the big-M method to solve a maximization problem. 4.11. Consider the linear programming problem minimize subject to

z = cTx Ax ≥ b x ≥ 0,

where b ≥ 0. It is possible to use a single artificial variable to obtain an initial basic feasible solution to this problem. Let s be the vector of excess variables, e = (1, . . . , 1)T and a be an artificial variable. Consider the phase-1 problem minimize subject to

z = a Ax − s + ae = b x, s, a ≥ 0.

(i) Assume for simplicity that b1 = max { bi }. Prove that { a, s2 , s3 , . . . , sm } is a feasible basis for the new problem. (ii) Prove that if the original problem is feasible, then the phase-1 problem will have optimal objective value z∗ = 0, and if the original problem is infeasible it will have optimal objective value z∗ > 0.

5.5

Degeneracy and Termination

The version of the simplex method that we have described can fail, cycling endlessly without any improvement in the objective and without finding a solution. This can only happen on degenerate problems, problems where a basic variable is equal to zero in some basis. On a degenerate problem, an iteration of the simplex method need not improve the value of the objective function. Suppose that at some iteration, xt is the entering variable and xs is the leaving variable. Then the formulas for the simplex method in Section 5.2 indicate that bˆs x¯t = and z¯ = zˆ + cˆt x¯t , aˆ s,t where z¯ is the new objective value. On a degenerate problem it is possible that bˆs = 0 and x¯t = 0, the entering variable will have value 0 in the new basis (the same value it had as a nonbasic variable), and the objective value will not change (¯z = zˆ ). Example 5.9 (Degeneracy). Consider the problem minimize subject to

z = −x1 − x2 x1 ≤ 2 x1 + x2 ≤ 2 x1 , x2 ≥ 0.

i

i i

i

i

i

i

5.5. Degeneracy and Termination

book 2008/10/23 page 163 i

163

The successive bases for this problem are basic

⇓ x1

x2

x3

x4

rhs

−z

−1

−1

0

0

0

x3 x4

1 1

0 1

1 0

0 1

2 2

basic

x1

⇓ x2

x3

x4

rhs

−z

0

−1

1

0

2

x1 x4

1 0

0 1

1 −1

0 1

2 0

basic

x1

x2

x3

x4

rhs

−z

0

0

0

1

2

x1 x2

1 0

0 1

1 −1

0 1

2 0

The degeneracy arises because of the tie in the ratio test at the first iteration. At the second iteration, x2 enters the basis but its new value is zero. As a result, the values of the variables and the objective function are unchanged. If the problem is not degenerate, then bˆs > 0 and so x¯t > 0 and z¯ < zˆ . This fact will be used to prove that, if the problem is not degenerate, then our version of the simplex method is guaranteed to terminate. The “linear program” mentioned in the theorem might be a phase-1 problem or might include big-M terms for problems where an initial basic feasible solution is not available. In the case of a phase-1 problem (say), the “optimal basic feasible solution” would only be a solution to the phase-1 problem and, if the optimal objective value were positive, would indicate that the original problem were infeasible. Theorem 5.10 (Finite Termination; Nondegenerate Case). Suppose that the simplex method is applied to a linear program, and that at every iteration every basic variable is strictly positive. Then in a finite number of iterations the method either terminates at an optimal basic feasible solution or determines that the problem is unbounded. Proof. Consider an iteration of the simplex method. If all the reduced costs satisfy cˆj ≥ 0, then the current basis is optimal and the method terminates. Otherwise, it is possible to choose an entering variable xt with cˆt < 0. The ratio test for this variable computes   bˆi : aˆ i,t > 0 . min 1≤i≤m aˆ i,t

i

i i

i

i

i

i

164

book 2008/10/23 page 164 i

Chapter 5. The Simplex Method

We have assumed that at every iteration every basic variable is strictly positive, so that bˆi > 0 for all i. If aˆ i,t ≤ 0 for all i, then there is no valid ratio to consider in the ratio test, and the problem is unbounded. Otherwise, the minimum ratio from the ratio test will be strictly positive; let its value be α. The new value of the entering variable will be xt = α and the objective will change by α cˆt < 0, so that the new value of the objective will be strictly less than the current value. The value of the objective is completely determined by the choice of basis (the values of the basic variables are determined from the equality constraints, and the nonbasic variables are equal to zero). Since the objective is strictly decreased at every iteration, no basis can reoccur. Since there are only finitely many bases, the simplex method must terminate in a finite number of iterations. Termination is not guaranteed for degenerate problems. Consider the linear program minimize

z = − 34 x1 + 150x2 −

subject to

1 x 4 1 1 x 2 1

− 60x2 − − 90x2 −

1 x 25 3 1 x 50 3

1 x 50 3

+ 6x4

+ 9x4 ≤ 0 + 3x4 ≤ 0 x3 ≤ 1

x1 , x2 , x3 , x4 ≥ 0. We will apply the simplex method to this problem, using the most negative reduced cost to select the entering variable, and breaking ties in the ratio test by selecting the first candidate row. If this is done, then the simplex method cycles—endlessly repeating the same sequence of bases with no improvement in the objective and without finding the optimal solution. It leads to the following sequence of basic solutions:

basic

⇓ x1

x2

x3

x4

x5

x6

x7

rhs

−z

− 34

150

1 − 50

6

0

0

0

0

x5

1 4 1 2

−60

1 − 25

9

1

0

0

0

−90 0

1 − 50

3 0

0 0

1 0

0 1

0 1

x6 x7

basic

0

x1

1

⇓ x2

x3

x4

x5

x6

x7

rhs

33

3

0

0

0

−z

0

−30

7 − 50

x1

1

−240

4 − 25

36

4

0

0

0

0

30

3 50

−15

−2

1

0

0

0

0

1

0

0

0

1

1

x6 x7

i

i i

i

i

i

i

5.5. Degeneracy and Termination

165

basic

x1

x2

⇓ x3

x4

x5

x6

x7

rhs

−z

0

0

2 − 25

18

1

1

0

0

x1

1

0

−84

−12

8

0

0

− 12

1 − 15

1 30

0

0

0

0

0

1

1

0

1

8 25 1 500

0

0

1

basic

x1

x2

x3

⇓ x4

x5

x6

x7

rhs

−z

1 4

0

0

−3

−2

3

0

0

x3

25 8 1 − 160 − 25 8

0

1

− 525 2

− 75 2

25

0

0

1

0

0

0

0

1 120 75 2

1 − 60

0

1 40 525 2

−25

1

1

x2 x7

x2 x7

basic

x1

x2

x3

x4

⇓ x5

x6

x7

rhs

−z

− 12

120

0

0

−1

1

0

0

x3

− 125 2

10500

1

0

50

−150

0

0

x4

− 14 125 2

− 23

0

0

150

1

1

x7

40

0

1

1 3

−10500

0

0

−50

basic

x1

x2

x3

x4

x5

⇓ x6

x7

rhs

−z

− 47

330

1 50

0

0

−2

0

0

x5

210

1

−3

0

0

−30

1 50 1 − 150

0

x4

− 45 1 6

1

0

1 3

0

0

x7

0

0

1

0

0

0

1

1

basic

⇓ x1

x2

x3

x4

x5

x6

x7

rhs

−z

− 34

150

1 − 50

6

0

0

0

0

x5

1 4 1 2

−60

1 − 25

9

1

0

0

0

−90 0

1 − 50

3 0

0 0

1 0

0 1

0 1

x6 x7

0

book 2008/10/23 page 165 i

1

i

i i

i

i

i

i

166

book 2008/10/23 page 166 i

Chapter 5. The Simplex Method

The final basis is the same as the initial basis, so the simplex method has made no progress and will continue to cycle through these six bases indefinitely. A variety of techniques have been developed that guarantee termination of the simplex method even on degenerate problems. One of these, discovered by Bland (1977) and often referred to as Bland’s rule, is described here. It is a rule for determining the entering and leaving variables, and it depends on an ordering of all the variables in the problem. Suppose that we have chosen the natural ordering: x1 , x2 , . . . . Then at each iteration of the simplex method choose the entering variable as the first variable from this list for which the reduced cost is strictly negative. Then, among all the potential leaving variables that give the minimum ratio in the ratio test, choose the one that appears first in this list. Bland’s rule determines how to break ties in the ratio test. If Bland’s rule is applied to this example, then the first few bases are the same. The first change occurs with the fifth basic solution

basic

⇓ x1

x2

x3

x4

x5

x6

x7

rhs

−z

− 12

120

0

0

−1

1

0

0

x3

− 125 2

10500

1

0

50

−150

0

0

x4

− 14 125 2

− 23

0

0

150

1

1

x7

40

0

1

1 3

−10500

0

0

−50

The rest of the basic solutions are basic

x1

x2

x3

x4

⇓ x5

x6

x7

rhs

− 75

11 5

1 125

1 125

−z

0

36

0

0

x3

0

0

1

0

0

0

1

1

x4

0

−2

0

1

x1

1

−168

0

0

2 15 − 45

1 − 15 12 5

1 250 2 125

1 250 2 125

basic

x1

x3

x4

x5

x6

x7

rhs

21 2

0

3 2

1 20

1 20

x2

−z

0

15

0

x3

0

0

1

0

0

0

1

1

x4

0

−15

0

15 2

1

− 21

x1

1

−180

0

6

0

2

3 100 2 50

3 100 2 50

As hoped, with Bland’s rule the simplex method terminates. Bland’s rule can be inefficient if applied at every simplex iteration since it may select entering variables that do not greatly improve the value of the objective function. To rectify this, Bland’s rule need only be used at degenerate vertices where there is a danger of cycling.

i

i i

i

i

i

i

5.5. Degeneracy and Termination

book 2008/10/23 page 167 i

167

At other iterations a more effective pivot rule should be used. An alternative is to use the perturbation method described in Section 5.5.1. It can be shown that if the simplex method uses Bland’s rule it will always terminate. Theorem 5.11 (Termination with Bland’s Rule). If the simplex method is implemented using Bland’s rule to select the entering and leaving variables, then the simplex method is guaranteed to terminate. Proof. See the paper by Bland (1977).

5.5.1

Resolving Degeneracy Using Perturbation

Another way to resolve degeneracy in the simplex method is to introduce small perturbations into the right-hand sides of the constraints. These perturbations remove the degeneracy, so the method makes progress at every iteration and hence is guaranteed to terminate. In some software packages explicit perturbations are introduced. However, in the technique that we describe here, the perturbations are merely symbolic. They are used to derive a pivot rule for the simplex method that prevents cycling. This approach is also referred to as the lexicographic method of resolving degeneracy. A related technique can be applied to network problems in a particularly efficient manner (see Section 8.5). If the simplex method is applied to a degenerate problem, then it is possible that at some iteration the minimum ratio from the ratio test will be zero, and thus there is a risk of cycling. (Even if cycling does not occur, the simplex method may perform a long sequence of degenerate updates, a phenomenon known as stalling, and only make slow progress toward a solution.) Suppose that each basic variable were perturbed: (xB )i ← (xB )i + i , where { i } is a set of small positive numbers. Then none of the perturbed basic variables would be zero, and the risk of cycling would be removed (at least at the current iteration). The method we will describe is a more elaborate version of this simple idea. Consider a linear program where the constraints have been perturbed to Ax = b + , where  = ( 0

02

· · · 0m )T

and 0 > 0 is some “sufficiently small” positive number. (There will not be any need to specify 0 ; it will only need to be “small enough” for certain inequalities to hold.) The simplex method will be applied to this perturbed problem and, once the solution has been found, 0 will be set equal to zero to obtain the solution to the original problem. Let xB be some basic feasible solution to the perturbed problem corresponding to a basis matrix B, and denote the entries in B −1 by (βi,j ). Then xB = B −1 (b + ) = B −1 b + B −1  and so (xB )i = bˆi + βi,1 0 + βi,2 02 + · · · + βi,m 0m ,

i

i i

i

i

i

i

168

book 2008/10/23 page 168 i

Chapter 5. The Simplex Method

where bˆi = (B −1 b)i . We will say that (xB )i is lexicographically positive if the first nonzero term in the above formula is positive. This is equivalent to saying that (xB )i is positive for all sufficiently small 0 . To see this, first consider the case where bˆi > 0. Then (xB )i = bˆi + 0 (βi,1 + βi,2 0 + · · ·) and so if 0 is small enough, (xB )i > 0. Now suppose that bˆi = 0, βi,j = 0 for j = 1, . . . , k − 1, and βi,k > 0. Then (xB )i = βi,k 0k + βi,k+1 0k+1 + · · · + βi,m 0m , or

(xB )i = βi,k + 0 (βi,k+1 + βi,k+2 0 + · · ·). 0k

Once again, (xB )i > 0 for small enough 0 . Correspondingly, we will say that (xB )j is lexicographically smaller than (xB )i if (xB )i − (xB )j is lexicographically positive. For sufficiently small 0 , this is the same as (xB )i > (xB )j . This will be true if and only if the first nonzero term in the formula for (xB )i − (xB )j is positive. It is possible to test these lexicographic conditions without specifying a value for 0 . Example 5.12 (Lexicographic Ordering). Let  B

−1

=

1 1 0

−2 −2 3

2 3 4

 and

bˆ =

  0 0 . 1

Then (xB )1 = 0 + 10 − 202 + 203 (xB )2 = 0 + 10 − 202 + 303 (xB )3 = 1 + 00 + 302 + 403 . All three components of xB are lexicographically positive since the first nonzero term in each expression is nonzero. Also, (xB )1 is smaller than (xB )2 since (xB )2 − (xB )1 = 0 + 00 + 002 + 103 , and the first nonzero coefficient in this expression is positive. In addition, (xB )2 is lexicographically smaller than (xB )3 . For general 0 it is not possible for two components (xB )i and (xB )j to be lexicographically equal (i.e., all the terms in their formulas have identical coefficients). This would imply that βi,k = βj,k for k = 1, . . . , m

i

i i

i

i

i

i

5.5. Degeneracy and Termination

book 2008/10/23 page 169 i

169

and hence that B −1 had two identical rows. This is impossible since the rows of an invertible matrix must be linearly independent. It is this property that guarantees that the perturbed linear program will never have a degenerate basic feasible solution. We will now prove that the simplex method applied to the perturbed problem is guaranteed to terminate. For simplicity, we will assume that the linear program has a complete set of slack variables. The application of the technique to linear programs in standard form will be considered in the Exercises. Theorem 5.13. Consider a linear program of the form minimize

z = cTx

subject to

Ax ≤ b x≥0

with b ≥ 0. Assume that the constraints are perturbed to Ax ≤ b + , where  = ( 0 · · · 0m )T and 0 is sufficiently small. Then the simplex method applied to the perturbed problem is guaranteed to terminate. Proof. We will show by induction that the components of xB are lexicographically positive at every iteration, and hence (by Theorem 5.10) the simplex method is guaranteed to terminate. For the linear program with slack variables, at the first iteration we can select B = I and (xB )i = bi + 0i . Since bi ≥ 0, each component of the initial xB is lexicographically positive. At a general iteration with basis matrix B, assume that the components of xB are lexicographically positive. If the current basis is not optimal, let xt be the entering variable. The only way that the next basic feasible solution can be degenerate is if there is a tie in the minimum ratio test: (xB )j (xB )i = . aˆ i,t aˆ j,t The left-hand and right-hand sides of this equation would then be lexicographically equal, implying that rows i and j of B −1 were multiples of each other, and hence B −1 would not be invertible (which is impossible). Hence the ratio test must identify a unique leaving variable, say (xB )s . We will now show that the new basic feasible solution is lexicographically positive. In the pivot row (xB )s ← (xB )s /aˆ s,t , where aˆ s,t > 0, so (xB )s remains lexicographically positive. In the other rows of the tableau (xB )j ← (xB )j −

aˆ j,t (xB )s . aˆ s,t

i

i i

i

i

i

i

170

book 2008/10/23 page 170 i

Chapter 5. The Simplex Method

If aˆ j,t ≤ 0, then this is the sum of a lexicographically positive term and a term that is either lexicographically positive or zero, so the result is lexicographically positive. If aˆ j,t > 0, then the update can be rewritten as   (xB )j (xB )s . − (xB )j ← aˆ j,t aˆ j,t aˆ s,t Since the right-hand side is the difference of two ratios from the ratio test, and (xB )s produced the minimum ratio, the new value of (xB )j is lexicographically positive. The number 0 can be considered merely as a symbol. It need not be assigned a specific value. To determine whether a component

(xB )i is lexicographically positive, it is only necessary to know the coefficients βi,k , i.e., to know the coefficients in the corresponding row of B −1 . In fact, we only need to know the first nonzero coefficient in this set. Similarly, in the ratio test we only need to compare the leading terms in the formulas for (xB )i and (xB )j to determine the minimum ratio. For nondegenerate problems, the coefficients βi,k would never have to be examined.

Exercises 5.1. Suppose that at the current iteration of the simplex method the basic feasible solution is degenerate. Is the objective value guaranteed to remain unchanged? 5.2. Consider the system of equations Bx = b +  where ⎛ ⎞     0 1 2 1 5 −1 ⎝ B = 1 1 2 , b = 5 , and  = 02 ⎠ . 1 1 3 5 3 0

−1

Sort the components of x = B (b + ) lexicographically. 5.3. Apply the perturbation method to the linear program from this section: minimize

z = − 34 x1 + 150x2 −

subject to

1 x 4 1 1 x 2 1

− 60x2 − − 90x2 −

1 x 25 3 1 x 50 3

1 x 50 3

+ 6x4

+ 9x4 ≤ 0 + 3x4 ≤ 0 x3 ≤ 1

x1 , x2 , x3 , x4 ≥ 0. 5.4. When the simplex method was applied to the sample linear program (see the previous problem) and cycling occurred, ties in the ratio test were broken by choosing the first candidate variable. Does cycling occur in this example when the last candidate variable is chosen? (Be sure that you choose the first candidate entering variable in the optimality test, just as before.) 5.5. Show how to apply the perturbation technique to a linear program in standard form. (In the proof of Theorem 5.13, the linear program had a complete set of slack variables. This is not true in general.)

i

i i

i

i

i

i

5.6. Notes

book 2008/10/23 page 171 i

171

5.6. Consider a linear program in standard form with exactly two variables. Prove that cycling cannot occur. 5.7. Consider a linear program in standard form with exactly one equality constraint. Prove that cycling cannot occur.

5.6

Notes

The Simplex Method—From the 1940s to the present, George Dantzig’s work on linear programming has been immensely influential. Dantzig’s book (1963, reprinted 1998) contains a vast amount of relevant material. More recent reference works include the books by Chvátal (1983), Murty (1983), Schrijver (1986, reprinted 1998), and Bazaraa, Jarvis, and Sherali (1990). Early discussions of what would later be called linear programming can be found in the works of Kantorovich (1939) and von Neumann (1937). The revised simplex method was first described by Dantzig (1953) and Orchard-Hays (1954). An extensive discussion can be found in the book by Dantzig (1963). Degeneracy—The first example of cycling was constructed by Hoffman (1953). Our smaller example is due to Beale (1955). The perturbation method was described by Charnes (1952), and the lexicographic method by Dantzig, Orden, and Wolfe (1955). Bland’s rule is, not surprisingly, found in a paper by Bland (1977).

i

i i

i

i

book 2008/10/23 page 172 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 173 i

Chapter 6

Duality and Sensitivity

6.1 The Dual Problem For every linear programming problem there is a companion problem, called the “dual” linear program, in which the roles of variables and constraints are reversed. That is, for every variable in the original or “primal” linear program there is a constraint in the dual problem, and for every constraint in the primal there is a variable in the dual. In an application, the variables in the primal problem might represent products, and the objective coefficients might represent the profits associated with manufacturing those products. Hence the objective in the primal indicates directly how an increase in production affects profit. The constraints in the primal problem might represent the availability of raw materials. An increase in the availability of raw materials might allow an increase in production, and hence an increase in profit, but this relationship is not as easy to deduce from the primal problem. One of the effects of duality theory is to make explicit the effect of changes in the constraints on the value of the objective. It is because of this interpretation that the variables in the dual problem are sometimes called “shadow prices,” since they measure the implicit “costs” associated with the constraints. Duality can also be used to develop efficient linear programming methods. For example, at the current time, the most successful interior-point software relies on a combination of primal and dual information. While it is possible to define a dual to any linear program, the symmetry of the two problems is most obvious when the linear program is in canonical form. A minimization problem is in canonical form if all problem constraints are of the “≥” type, and all variables are nonnegative: minimize z = cTx subject to Ax ≥ b x ≥ 0. We shall refer to this original problem as the primal linear program. The corresponding dual linear program will have the form maximize

w = bTy

subject to

AT y ≤ c y ≥ 0.

173

i

i i

i

i

i

i

174

book 2008/10/23 page 174 i

Chapter 6. Duality and Sensitivity

If the primal problem has n variables and m constraints, then the dual problem will have m variables (one dual variable for each primal constraint) and n constraints (one dual constraint for each primal variable). The coefficients in the objective of the primal are the coefficients on the right-hand side of the dual, and vice versa. The constraint matrix in the dual is the transpose of the matrix in the primal. The dual problem is a maximization problem, where all constraints are of the “≤” type, and all variables are nonnegative. This form is referred to as the canonical form for a maximization problem. Example 6.1 (Canonical Dual Linear Program). Consider the primal problem, a linear program in canonical form minimize subject to

z = 6x1 + 2x2 − x3 + 2x4 4x1 + 3x2 − 2x3 + 2x4 ≥ 10 8x1 + x2 + 2x3 + 4x4 ≥ 18 x1 , x2 , x3 , x4 ≥ 0.

Then its dual is maximize subject to

w = 10y1 + 18y2 4y1 + 8y2 ≤ 6 3y1 + y2 ≤ 2 −2y1 + 2y2 ≤ −1 2y1 + 4y2 ≤ 2 y1 , y2 ≥ 0.

Here y1 is the dual variable corresponding to the first primal constraint and y2 is the dual variable corresponding to the second primal constraint. The first dual constraint (4y1 −8y2 ≤ 8) corresponds to the primal variable x1 ; similarly the second, third, and fourth constraints in the dual correspond to the primal variables x2 , x3 , and x4 , respectively. Any linear program can be transformed to an equivalent problem in canonical form. A “≤” constraint can simply be multiplied by −1. An equality constraint can be written as two inequalities, since the equation a = b is equivalent to the simultaneous inequalities a ≥ b and −a ≥ −b. The requirement that all variables be nonnegative can be handled in the same way that conversion to standard form was handled (see Section 4.2). And a maximization problem can be converted to a minimization problem by multiplying the objective by −1. The next lemma shows that the role of the primal and dual could be interchanged. It also indicates that the dual of a maximization problem in canonical form is a minimization problem in canonical form. Lemma 6.2. The dual of the dual linear program is the primal linear program. Proof. We need only consider a canonical minimization problem minimize subject to

z = cTx Ax ≥ b x ≥ 0,

i

i i

i

i

i

i

6.1. The Dual Problem

book 2008/10/23 page 175 i

175

since any linear program can be transformed to this form. The dual program is maximize

w = bTy

subject to

AT y ≤ c y ≥ 0.

This is equivalent to the following minimization problem in canonical form: minimize

w = −bTy

subject to

−ATy ≥ −c y ≥ 0.

The dual of this problem is

z = −cTx −Ax ≤ −b x ≥ 0. This linear program is equivalent to the program maximize subject to

minimize

z = cTx

subject to

Ax ≥ b x ≥ 0,

which is the primal linear program. Although it is possible to determine the dual of any linear program simply by converting it to canonical form, there are easy rules for obtaining the dual problem from the primal problem directly. These rules can be deduced by considering some general linear programs. First consider a primal problem which has a mix of “≥” constraints, “≤” constraints, and “=” constraints: minimize z = cTx subject to A1 x ≥ b1 A2 x ≤ b2 A3 x = b3 x ≥ 0. We can convert it to an equivalent problem in canonical form: minimize subject to

z = cTx A1 x ≥ b1 −A2 x ≥ −b2 A3 x ≥ b3 −A3 x ≥ −b3 x ≥ 0.

If we define y1 , y2 , y3 , and y3 to be the vectors of dual variables corresponding to the four groups of constraints, then the dual problem is maximize

w = b1Ty1 − b2Ty2 + b3Ty3 − b3Ty3

subject to

AT1 y1 − AT2 y2 + AT3 y3 − AT3 y3 ≤ c y1 ≥ 0, y2 ≥ 0, y3 ≥ 0, y3 ≥ 0.

i

i i

i

i

i

i

176

book 2008/10/23 page 176 i

Chapter 6. Duality and Sensitivity

Defining y2 = −y2 and y3 = y3 − y3 , the dual problem can be rewritten in the form maximize

w = b1Ty1 + b2Ty2 + b3Ty3

subject to

AT1 y1 + AT2 y2 + AT3 y3 ≤ c y1 ≥ 0, y2 ≤ 0, y3 unrestricted.

Notice that the directions of the constraints in the original primal are not in canonical form. Likewise, the signs of the variables in the final dual are not in canonical form. Let us examine these anomalies. The dual variables associated with primal “≥” constraints are nonnegative, but the dual variables associated with “≤” constraints are nonpositive, and the dual variables associated with the “=” constraints are unrestricted. This could be restated as follows: If the direction of a primal constraint is consistent with canonical form, the corresponding dual variable is nonnegative; if the direction of the constraint is reversed with respect to canonical form, the corresponding dual variable is nonpositive; and if the constraint is an equality, the corresponding dual variable is unrestricted. This is a general rule. It also applies to maximization problems which have a mix of “≥” constraints, “≤” constraints, and “=” constraints (see the Exercises). The direction of a constraint in a problem will be “consistent with respect to canonical form” if it is of the “≥” type in a minimization problem, or if it is of the “≤” type in a maximization problem. Now consider a primal linear program, which has a mix of nonnegative, nonpositive, and unrestricted variables: minimize z = c1Tx1 + c2Tx2 + c3Tx3 subject to

A 1 x1 + A 2 x2 + A 3 x3 ≥ b x1 ≥ 0, x2 ≤ 0, x3 unrestricted.

If we put this problem in canonical form, and then simplify the dual problem, we obtain maximize subject to

w = bTy AT1 y ≤ c1 AT2 y ≥ c2 AT3 y = c3 y ≥ 0.

Here the signs of the variables in the primal are not in canonical form, and neither are the directions of the constraints in the dual. If a primal variable is nonnegative, the direction of the corresponding dual constraint will be consistent with (the dual’s) canonical form; if it is nonpositive, the direction of the dual constraint will be reversed with respect to canonical form; and if the variable is unrestricted, the corresponding constraint will be an equality. This is a general rule, both for minimization and maximization problems. Notice that it is symmetric (or “dual”) to the rule that we obtained earlier. We can summarize the relationship between the constraints and variables in the primal and dual problems as follows: primal/dual constraint dual/primal variable consistent with canonical form ⇐⇒ variable ≥ 0 reversed from canonical form ⇐⇒ variable ≤ 0 equality constraint ⇐⇒ variable unrestricted

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 177 i

177

Example 6.3 (General Dual Linear Problem). Consider the primal problem maximize subject to

Then its dual is

minimize

z = 6x1 + x2 + x3 4x1 + 3x2 − 2x3 = 1 6x1 − 2x2 + 9x3 ≥ 9 2x1 + 3x2 + 8x3 ≤ 5 x1 ≥ 0, x2 ≤ 0, x3 unrestricted. w = y1 + 9y2 + 5y3

4y1 + 6y2 + 2y3 ≥ 6 3y1 − 2y2 + 3y3 ≤ 1 −2y1 + 9y2 + 8y3 = 1 y1 unrestricted, y2 ≤ 0, y3 ≥ 0. The primal problem is a maximization problem. Its first constraint is an equality, and its second constraint and third constraint are, respectively, reversed and consistent with respect to the canonical form of a maximization problem. For this reason y1 is unrestricted, y2 ≤ 0, and y3 ≥ 0. Now the dual problem is a minimization problem. Because x1 ≥ 0 and x2 ≤ 0, the first and second dual constraints are, respectively, consistent and reversed with respect to the canonical form of a minimization problem. Because x3 is unrestricted, the third dual constraint is an equality. It is easy to verify that the dual of the dual is the primal. subject to

In the following sections it will be useful to consider the dual of a problem in standard form. If the primal problem is minimize

z = cTx

subject to

Ax = b x ≥ 0,

then its dual is

maximize w = bTy subject to ATy ≤ c. The dual variables y are unrestricted. The concept of a dual problem applies not only to linear programs, but also to a wide range of problems from a wide variety of fields such as engineering, physics, and mathematics. For example it is also possible to define a dual problem for nonlinear optimization problems (see Chapter 14). There, the dual variables are often called Lagrange multipliers.

Exercises 1.1. Find the dual of minimize subject to

z = 3x1 − 9x2 + 5x3 − 6x4 4x1 + 3x2 + 5x3 + 8x4 ≥ 24 2x1 − 7x2 − 4x3 − 6x4 ≥ 17 x1 , x2 , x3 , x4 ≥ 0.

i

i i

i

i

i

i

178 1.2. Find the dual of

book 2008/10/23 page 178 i

Chapter 6. Duality and Sensitivity

minimize subject to

z = −2x1 + 4x2 − 3x3 9x1 − 2x2 − 8x3 = 5 3x1 + 3x2 + 3x3 = 7 7x1 − 5x2 + 2x3 = 9 x1 , x2 , x3 ≥ 0.

1.3. Find the dual of maximize subject to

z = 6x1 − 3x2 − 2x3 + 5x4 4x1 + 3x2 − 8x3 + 7x4 = 11 3x1 + 2x2 + 7x3 + 6x4 ≥ 23 7x1 + 4x2 + 3x3 + 2x4 ≤ 12 x1 , x2 ≥ 0, x3 ≤ 0 (x4 unrestricted).

Verify that the dual of the dual is the primal. 1.4. Obtain the dual to the problem minimize subject to

z = c1Tx1 + c2Tx2 + c3Tx3 A1 x1 + A2 x2 + A3 x3 ≥ b x1 ≥ 0, x2 ≤ 0, x3 unrestricted

by converting the problem to canonical form, finding its dual, and then simplifying the result. 1.5. Find the dual to the problem minimize

z = cTx

subject to

Ax = b l ≤ x ≤ u,

where l and u are vectors of lower and upper bounds on x. 1.6. Find the dual to the problem minimize

z = cTx

subject to

b1 ≤ Ax ≤ b2 x ≥ 0.

1.7. Can you find a linear program which is its own dual? (We will say that the two problems are the same if one can be obtained from the other merely by multiplying the objective, any of the constraints, or any of the variables by −1.) 1.8. Write a computer program that, when given a linear program (not necessarily in standard form), will generate the dual linear program automatically. 1.9. If you have linear programming software available, experiment with the properties of a pair of primal and dual linear programs. What is the relationship between their optimal values? Change the coefficients in the objective or on the right-hand side of the constraints and observe what happens to the optimal values of the linear programs. Examine the relationship between the ith variable in one problem and the ith constraint in the other.

i

i i

i

i

i

i

6.2. Duality Theory

6.2

book 2008/10/23 page 179 i

179

Duality Theory

There are two major results relating the primal and dual problems. The first, called “weak” duality, is easier to prove. It states that primal objective values provide bounds for dual objective values, and vice versa. This weak duality property can be extended to nonlinear optimization problems and other more general settings. The second, called “strong” duality, states that the optimal values of the primal and dual problems are equal, provided that they exist. For nonlinear problems there may not be a strong duality result. In the theoretical results below we work with primal linear programs in standard form. In Section 4.2 it was shown that every linear program can be converted to standard form. Hence working with problems in standard form is primarily a matter of convenience. It makes it unnecessary to examine a great many different cases corresponding to linear programs in a variety of forms. We begin with a simple theorem. Theorem 6.4 (Weak Duality). Let x be a feasible point for the primal problem in standard form, and let y be a feasible point for the dual problem. Then z = cTx ≥ bTy = w. Proof. The constraints for the dual show that cT ≥ y TA. Since x ≥ 0, z = cTx ≥ y TAx = y Tb = bTy = w. We have stated and proved the weak duality theorem in the case where the primal problem is a minimization problem. For a primal problem in general form, the weak duality result would say that the objective value corresponding to a feasible point for the maximization problem would always be less than or equal to the objective value corresponding to a feasible point for the minimization problem. Example 6.5 (Weak Duality). Consider the primal and dual linear programs in Example 6.1. It is easy to check that the point x = (4, 0, 0, 0)T is feasible for the primal and that the point y = ( 12 , 0)T is feasible for the dual. At these points z = cTx = 24 > 5 = bTy = w, so that the weak duality theorem is satisfied. There are several simple consequences of the weak duality theorem. For proofs, see the Exercises. Corollary 6.6. If the primal is unbounded, then the dual is infeasible. If the dual is unbounded, then the primal is infeasible. Corollary 6.7. If x is a feasible solution to the primal, y is a feasible solution to the dual, and cTx = bTy, then x and y are optimal for their respective problems.

i

i i

i

i

i

i

180

book 2008/10/23 page 180 i

Chapter 6. Duality and Sensitivity

Corollary 6.7 is used in the proof of strong duality. It shows that it is possible to check if the points x and y are optimal without solving the corresponding linear programs. By the way, it is possible for both the primal and dual problems to be infeasible. Example 6.8 (Primal/Dual Relationships). First consider the primal problem maximize subject to

z = x 1 + x2 x1 − x2 ≤ 1 x1 , x2 ≥ 0,

and its dual problem

w = y1 y1 ≥ 1 −y1 ≥ 1 y1 ≥ 0. Here, the primal problem is unbounded, and the dual is infeasible. Next consider the infeasible problem minimize subject to

maximize subject to

z = 2x1 − x2 x1 + x2 ≥ 1 −x1 − x2 ≥ 1.

In general, the dual of an infeasible problem could be either infeasible or unbounded. Here the dual problem is minimize z = y1 + y2 subject to y1 − y2 = 2 y1 − y2 = −1, which is infeasible. Theorem 6.9 (Strong Duality). Consider a pair of primal and dual linear programs. If one of the problems has an optimal solution then so does the other, and the optimal objective values are equal. Proof. For convenience, we can assume that (a) the primal problem has an optimal solution (since the roles of primal and dual could be interchanged), (b) the primal problem is in standard form, and (c) x∗ , the solution to the primal, is an optimal basic feasible solution. By reordering the variables we can write x∗ in terms of basic and nonbasic variables:   xB x∗ = xN and correspondingly we write  A = (B

N)

and

c=

cB cN

 .

Then xB = B −1 b. If x∗ is optimal, the reduced costs satisfy cNT − cBT B −1 N ≥ 0 or cBT B −1 N ≤ cNT .

i

i i

i

i

i

i

6.2. Duality Theory

book 2008/10/23 page 181 i

181

Let y∗ be the vector of simplex multipliers corresponding to this basic feasible solution: y∗ = B −T cB or y∗T = cBT B −1 . We will show that y∗ is feasible for the dual and that bTy∗ = cTx∗ . Then Corollary 6.7 will show that y∗ is optimal for the dual. We first check feasibility: y∗TA = cBT B −1 ( B N ) = ( cBT cBT B −1 N ) ≤ ( cBT

cNT ) = cT;

hence ATy∗ ≤ c and y satisfies the dual constraints. We now compute the objective values for the primal and the dual: z = cTx = cBT xB = cBT B −1 b w = bTy = y Tb = cBT B −1 b = z. So y∗ is feasible for the dual and has dual value equal to the optimal primal value. Hence by Corollary 6.7, y∗ is optimal for the dual. The proof of the strong duality theorem provides the optimal dual solution. If we write x∗ in terms of basic and nonbasic variables   xB x∗ = xN 

and write A = (B

N)

and

c=

cB cN

 ,

then the optimal values of the dual variables are given by the corresponding vector of simplex multipliers y∗ = B −T cB . It also follows from the proof that at any iteration, if y is the vector of simplex multipliers, then the vector of reduced costs is cˆ = c − ATy. Thus the reduced costs are the dual slack variables. If they are all nonnegative, then y is dual feasible and the solution is optimal. (In such cases, the basis is said to be dual feasible.) At any intermediate step the reduced costs are not all nonnegative and the vector of simplex multipliers is dual infeasible. Thus the simplex method generates a sequence of primal feasible solutions x and dual infeasible solutions y with cTx = bTy, terminating when y is dual feasible. If the original linear program has a complete set of slack variables, then the reduced costs for the slack variables are given by cNT − cBT B −1 N = 0T − cBT B −1 I = −(B −T cB )T = −y∗T, because the objective coefficients (cNT ) for the slack variables are zero, and their constraint coefficients (N) are given by I . In this case the values of the optimal dual variables are the same as the reduced costs of the slack variables (except for the sign). This is also true when there are excess or artificial variables; see the Exercises.

i

i i

i

i

i

i

182

book 2008/10/23 page 182 i

Chapter 6. Duality and Sensitivity

Example 6.10 (Linear Program with Slack Variables). Consider the example from Section 5.2: minimize z = −x1 − 2x2 subject to −2x1 + x2 ≤ 2 −x1 + 2x2 ≤ 7 x1 ≤ 3 x1 , x2 ≥ 0. The optimal basic solution is basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

1

2

13

x2 x1

0

1

0

1 2

1 2

5

1

0

0

0

1

3

1

− 12

3 2

3

0

1 2

x3

0

0

The optimal dual variables are ⎛ y∗T = cBT B −1 = ( −2

−1

0)⎝0 1

0 − 12

1 2



1⎠ = (0

−1

−2 ) .

3 2

These are the negatives of the reduced costs corresponding to the slack variables. The dual objective function is maximize w = 2y1 + 7y2 + 3y3 and so w∗ = 2(0) + 7(−1) + 3(−2) = −13 = z∗ , as expected. It is straightforward to verify that the constraints of the dual problem are satisfied.

6.2.1

Complementary Slackness

We discuss here a further relationship between a pair of primal and dual problems that have optimal solutions. There is an interdependence between the nonnegativity constraints in the primal (x ≥ 0) and the constraints in the dual (ATy ≤ c). At optimal solutions to both problems it is not possible to have both xj > 0 and (ATy)j < cj . At least one of these constraints must be binding: either xj is zero or the j th dual slack variable is zero. This property, called complementary slackness, can be summarized in the equation x T(c − ATy) = 0.  This equation is the same as j xj (c − ATy)j = 0. Since the primal and dual constraints ensure that each of the terms in the summation must be nonnegative, if the entire sum is zero, then every term is zero. The complementary slackness property is established in the following theorem. The theorem states that complementary slackness will hold between any pair of optimal primal and optimal dual solutions; these solutions need not correspond to a basis.

i

i i

i

i

i

i

6.2. Duality Theory

book 2008/10/23 page 183 i

183

Theorem 6.11 (Complementary Slackness). Consider a pair of primal and dual linear programs, with the primal problem in standard form. If x is optimal for the primal and y is optimal for the dual, then x T(c − ATy) = 0. If x is feasible for the primal, y is feasible for the dual, and x T(c − ATy) = 0, then x and y are optimal for their respective problems. Proof. As in the proof of weak duality (Theorem 6.4), if x and y are feasible, then z = cTx ≥ y TAx = y Tb = w. If x and y are optimal, then w = z so that cTx = y TAx = x TATy. Rearranging this final formula gives the first result. If x T(c − ATy) = 0, then z = w and Corollary 6.7 shows that x and y are then optimal.

Example 6.12 (Complementary Slackness). We look again at the linear program minimize subject to

z = −x1 − 2x2 − 2x1 + x2 + x3 = 2 − x1 + 2x2 + x4 = 7 x1 + x5 = 3 x1 , x2 , x3 , x4 , x5 ≥ 0.

The optimal solutions are x = (x1 , x2 , x3 , x4 , x5 )T = (3, 5, 3, 0, 0)T and y = (y1 , y2 , y3 )T = (0, −1, −2)T. The dual constraints are −2y1 − y2 + y3 y1 + 2y2 y1 y2 y3

≤ −1 ≤ −2 ≤0 ≤0 ≤ 0.

In the primal the last two nonnegativity constraints are binding (x4 ≥ 0 and x5 ≥ 0). In the dual the first three constraints are binding. So the complementary slackness condition is satisfied. It is possible to have both xj = 0 and cj − (ATy)j = 0, for example, when the problem is degenerate and one of the basic variables is zero. If this does not happen, that is, if exactly one of these two quantities is zero for all j , then the problem is said to satisfy a strict complementary slackness condition. If a linear programming problem has an optimal solution, then there always exists a strictly complementary optimal pair of solutions to the primal and the dual problems. This pair of solutions need not be basic solutions, however. (See the Exercises.) In the simplex method the complementary slackness conditions hold between any basic feasible solution and its associated vector of simplex multipliers: If xj > 0, then xj is a basic variable and its reduced cost (or dual slack variable) is zero. Conversely, if a dual slack variable (reduced cost) is nonzero, then the associated primal variable is nonbasic

i

i i

i

i

i

i

184

book 2008/10/23 page 184 i

Chapter 6. Duality and Sensitivity

and hence zero. Thus the simplex method maintains primal feasibility and complementary slackness and strives to achieve dual feasibility. If a linear program is not in standard form, then a complementary slackness condition holds between any restricted (nonnegative or nonpositive) variable and its corresponding dual constraint, as well as between any inequality constraint and its associated dual variable. Thus for the pair of primal and dual canonical linear programs minimize

z = cTx

subject to

Ax ≥ b x≥0

maximize subject to

w = bTy AT y ≤ c y≥0

the complementary slackness conditions are x T(c − ATy) = 0

and

y T(Ax − b) = 0.

(See the Exercises.)

6.2.2

Interpretation of the Dual

The dual linear program can be used to gain practical insight into the properties of a model. We will examine this idea via an example. Although the exact interpretation of the dual will vary from application to application, the approach we use (looking at the optimal values of the dual variables, as well as the dual problem as a whole) is general. Let us consider a baker who makes and sells two types of cakes, one simple and one elaborate. Both cakes require basic ingredients (flour, sugar, eggs, and so forth), as well as fancier ingredients such as nuts and fruit for decoration and flavor, with the elaborate cake using more of the fancier ingredients. There are also greater labor costs associated with the elaborate cake. The baker would like to maximize profit. A linear programming model for this situation might be maximize subject to

z = 24x1 + 14x2 3x1 + 2x2 ≤ 120 4x1 + x2 ≤ 100 2x1 + x2 ≤ 70 x1 , x2 ≥ 0.

Here x1 and x2 represent the number of batches of the elaborate and simple cakes produced per day. The objective records the profit. The first constraint represents the daily limits on the availability of basic ingredients (in pounds), where a batch of the elaborate cake requires 3 pounds, and a batch of the simple cake requires 2 pounds. The second constraint similarly records the limits on fancier ingredients. The third constraint records the limits on labor (measured in hours) where a batch of the elaborate cakes uses 2 hours of labor, and a batch of the simple cakes uses 1 hour of labor. The dual linear program is minimize subject to

w = 120y1 + 100y2 + 70y3 3y1 + 4y2 + 2y3 ≥ 24 2y1 + y2 + y3 ≥ 14 y1 , y2 , y3 ≥ 0.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 185 i

185

The optimal solution to the primal problem is z = 888, x1 = 16, and x2 = 36. The optimal solution to the dual problem is w = 888, y1 = 6.4, y2 = 1.2, and y3 = 0. Note that the two objective values are equal, and that the complementary slackness conditions are satisfied. In this problem the limiting factors are the availability of basic and fancy ingredients. (There are 2 hours of excess labor available; the bakery might employ one of the bakers part time or give additional tasks to this baker.) The baker might be able to purchase additional quantities of these ingredients. How much should the baker be willing to pay? Since the optimal primal and dual objective values are equal, and the dual objective is w = 120y1 + 100y2 + 70y3 , each extra pound of basic ingredients will be worth y1 = 6.4 dollars in profit, and each extra pound of fancy ingredients will be worth y2 = 1.2 dollars. Hence the dual variables determine the marginal values of these raw materials. Additional labor is of no value to the baker (y3 = 0) because excess labor is already available. (There are limits to this argument, however; if too many cakes are made the 2 excess hours of labor will be used up, and additional analysis of the model will be required.) There is an additional interpretation of the dual problem. Suppose that some other company would like to take over the baker’s business. What price should be offered? A price could be determined by setting values on the baker’s assets (plain ingredients, fancy ingredients, and labor); call these values y1 , y2 , and y3 . The other company would like to minimize the amount paid to the baker: minimize w = 120y1 + 100y2 + 70y3 . These values would be fair to the baker if they represented a profit at least as good as could be obtained by producing cakes, that is, if 3y1 + 4y2 + 2y3 ≥ 24 2y1 + y2 + y3 ≥ 14 These are the objective and constraints for the dual problem. Thus the dual problem allows us to determine the daily value of the baker’s business. Another interpretation of the dual problem arises in game theory. This is discussed in Section 14.8.

Exercises 2.1. Consider the linear program maximize subject to

z = −x1 − x2 −x1 + x2 ≥ 1 2x1 − x2 ≤ 2 x1 , x2 ≥ 0.

Find the dual to the problem. Solve the primal and the dual graphically, and verify that the results of the strong duality theorem hold. Verify that the optimal dual solution satisfies y T = cBT B −1 where B is the optimal basis matrix.

i

i i

i

i

i

i

186

book 2008/10/23 page 186 i

Chapter 6. Duality and Sensitivity

2.2. Prove that if both the primal and the dual problems have feasible solutions, then both have optimal solutions, and the optimal objective values of the two problems are equal. 2.3. Prove Corollary 6.6. 2.4. Prove Corollary 6.7. 2.5. Prove that if an excess variable has been included in the ith constraint, then the optimal reduced cost for this variable is the ith optimal dual variable yi . 2.6. Prove that if an artificial variable has been added to the ith constraint within a big-M approach, then the optimal reduced cost for this variable is yi − M, where yi is the ith optimal dual variable. 2.7. Consider a linear program with a single constraint minimize

z = c1 x1 + c2 x2 + · · · + cn xn

subject to

a 1 x1 + a 2 x2 + · · · + a n xn ≤ b x1 , x2 , . . . , xn ≥ 0.

Using duality develop a simple rule to determine an optimal solution, if the latter exists. 2.8. Using duality theory find the solution to the following linear program: minimize subject to

z = x1 + 2x2 + · · · + nxn x1 ≥ 1 x1 + x2 ≥ 2 .. . x1 + x2 + x3 + · · · + xn ≥ n x1 , x2 , x3 , . . . , xn ≥ 0.

2.9. Consider the primal linear programming problem minimize subject to

z = cTx Ax = b x ≥ 0.

Assume that this problem and its dual are both feasible. Let x∗ be an optimal solution to the primal and let y∗ be an optimal solution to the dual. For each of the following changes, describe what effect they have on x∗ and y∗ , if any. These changes should be considered individually—they are not cumulative. (i) The vector c is multiplied by λ, where λ > 0. (ii) The kth equality constraint is multiplied by λ. (iii) The ith equality constraint is modified by adding to it λ times the kth equality constraint. (iv) The right-hand side b is multiplied by λ. 2.10. Consider the following linear programming problems: maximize

z = cTx

subject to

Ax ≤ b

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 187 i

187

and

minimize subject to

z = cTx Ax ≥ b.

(i) Write the duals to these problems. (ii) If both of these problems are feasible, prove that if one of these problems has a finite optimal solution then so does the other. (iii) If both of these problems are feasible, prove that the first objective is unbounded above if and only if the second objective is unbounded below. (iv) Assume that both of these problems have finite optimal solutions. Let x be feasible for the first problem and let xˆ be feasible for the second. Prove that cTx ≤ cTx. ˆ 2.11. Prove that if the problem

z = cTx Ax = b x≥0 has a finite optimal solution, then the new problem minimize subject to

minimize subject to

z = cTx Ax = bˆ x≥0

ˆ cannot be unbounded for any choice of the vector b. 2.12. Consider the linear programming problem minimize subject to

z = cTx Ax = b x ≥ 0.

Let B be the optimal basis, and suppose that B −1 b > 0. Consider the problem minimize subject to

z = cTx Ax = b +  x ≥ 0,

where  is a vector of perturbations. Prove that if the elements of  are sufficiently small in absolute value, then B is also the optimal basis for the perturbed problem, and that the optimal dual solution is unchanged. What is the optimal objective value in this case? 2.13. Prove that if the system Ax ≤ b has a solution, then the system ATy = 0 bTy < 0 y≥0 has no solution.

i

i i

i

i

i

i

188

book 2008/10/23 page 188 i

Chapter 6. Duality and Sensitivity

2.14. (Farkas’ Lemma) Use the duality theorems to prove that the system ATy ≤ 0 bTy > 0 has a solution if and only if the system Ax = b x≥0 has no solution. 2.15. Consider the linear program z = 2x1 + 9x2 + 3x3 −2x1 + 2x2 + x3 ≥ 1 x1 + 4x2 − x3 ≥ 1 x1 , x2 , x3 ≥ 0.

maximize subject to

(i) Find the dual to this problem and solve it graphically. (ii) Use complementarity slackness to obtain the solution to the primal. 2.16. Suppose that in the previous problem the first constraint is replaced by the constraint −3x1 + 2x2 + x3 ≥ 1. Find the dual to the problem and solve it graphically. Can you use complementary slackness to obtain the dual solution? 2.17. Use a combination of duality theory, elimination of variables, and graphical solution to solve the following linear programs. Do not use the simplex method. (i) minimize subject to

z = −3x1 + 2x2 + x3 −3x2 − x3 ≤ 2 −x1 − x2 ≥ −3 −x1 − 2x2 − x3 ≥ 1 x1 , x2 ≥ 0.

(ii)

z = −2x1 − 4x2 + x3 + x4 2x1 − 2x2 + x3 + x4 ≥ 2 −x1 + x2 − x3 ≥ −1 3x1 + x2 + x4 = 5 x1 , x2 , x4 ≥ 0. 2.18. Derive the complementary slackness conditions for a pair of primal and dual linear programs in canonical form. 2.19. Consider the primal linear programming problem minimize subject to

minimize

z = cTx

subject to

Ax ≤ b x ≥ 0.

Assume that this problem and its dual are both feasible. Let x∗ be an optimal solution vector to the primal, let z∗ be its associated objective value, and let y∗ be an optimal solution vector to the dual problem. Show that z∗ = y∗TAx∗ .

i

i i

i

i

i

i

6.3. The Dual Simplex Method

book 2008/10/23 page 189 i

189

2.20. Let x∗ be an optimal solution to a linear program in standard form. Let y∗ be an optimal solution to the dual problem and let s∗ be the associated vector of dual slack variables. Prove that the solutions satisfy strict complementarity if and only if x∗Ts∗ = 0 and x∗ + s∗ > 0. 2.21. In the next two exercises we will prove that if both primal and dual linear programs have feasible solutions, then there exist feasible solutions to these problems that satisfy strict complementarity. We will assume that the primal problem is given in standard form, and will denote the primal by (P ) and its dual by (D). To start, we will prove in this exercise that there exists a feasible solution x¯ to the primal and a feasible solution y¯ to the dual with slack variables s¯ , such that x¯ + s¯ > 0. (i) Suppose that every feasible solution to the primal satisfies xj = 0 for some index j . Consider the linear programming problem (P ) maximize subject to

z = ejTx Ax = b x ≥ 0,

where ej is a vector with an entry of 1 in location j and zeros elsewhere. Prove that (P ) is feasible and has an optimal objective value of zero. (ii) Formulate the dual (D ) to (P ) and prove that it has an optimal solution with optimal objective value of zero. (iii) Let y be an optimal solution to (D ) and let s be the associated vector of slack variables. Prove that for any feasible solution y to (D) and corresponding slack variables s = c − ATy, the vector y + y is feasible to (D), with corresponding slack variables s + s + ej , so that the j th dual slack variable is at least 1. (iv) Prove that by taking appropriate strictly convex combinations of solutions to the primal (P ) and to the dual (D) we can obtain a feasible solution x¯ to the primal and a feasible solution y¯ to the dual with slack variables s¯ , such that x¯ + s¯ > 0. 2.22. Prove that any linear program with a finite optimal value has a strictly complementary primal-dual optimal pair. Hint: Let z∗ be the optimal objective value for a problem in standard form and consider the problem minimize subject to

z = cTx Ax = b cTx ≤ z∗ x ≥ 0.

Apply the results of the previous exercise to this problem.

6.3 The Dual Simplex Method The version of the simplex method that we have been using, which we now refer to as the primal simplex method, begins with a basic feasible solution to the primal linear program

i

i i

i

i

i

i

190

book 2008/10/23 page 190 i

Chapter 6. Duality and Sensitivity

and iterates until the primal optimality conditions are satisfied. It is also possible to apply the simplex method to the dual problem, starting with a feasible solution to the dual program and iterating until the dual optimality conditions are satisfied. The optimality conditions for the primal correspond to the feasibility conditions for the dual. This result was derived as part of the proof of Theorem 6.9, where it was shown that the primal optimality condition cNT − cBT B −1 N ≥ 0 is equivalent to the dual feasibility condition ATy ≤ c, where y = B −T cB is the vector of simplex multipliers corresponding to the basis B. Thus the primal simplex method moves through a sequence of primal feasible but dual infeasible bases, at each iteration trying to reduce dual infeasibility until the dual feasibility conditions are satisfied. The dual simplex method works in a “dual” manner. It goes through a sequence of dual feasible but primal infeasible bases, trying to reduce primal infeasibility until the primal feasibility conditions are satisfied. Although the dual simplex method can be viewed as the simplex method applied to the dual problem, it can be implemented directly in terms of the primal problem, if an initial dual feasible solution is available. The practical importance of the dual simplex method is discussed in Section 6.4. We assume that an initial dual-feasible basis has been specified; i.e., the reduced costs −1 −1 ˆ are nonnegative. As described here, the

algorithm uses B , xB = b = B b, and the current values of the reduced costs cˆj . (If the full tableau is used, this information can be read from the tableau.) The dual simplex method terminates when the current basis is primal feasible, so an iteration of the method begins by checking if xB ≥ 0. If not, some entry (xB )s < 0 is used to select the pivot row. We now describe an iteration of the dual simplex method, using an argument similar to that used to derive the primal simplex method. Suppose that a variable (xB )s is infeasible so that its right-hand-side entry bˆs < 0. In terms of the current basis the sth constraint has the form

(xB )s + aˆ s,j xj = bˆs < 0, j ∈N

where N is the set of indices of the nonbasic variables, and aˆ s,j are the entries in row s of B −1 A. If some entry aˆ s,j < 0 and nonbasic variable xj were to replace (xB )s in the basis, then the new value of xj would be bˆs > 0, aˆ s,j that is, the new basic variable would be feasible. Not all such nonbasic variables can enter the basis because the dual feasibility (primal optimality) conditions must remain satisfied.

i

i i

i

i

i

i

6.3. The Dual Simplex Method

book 2008/10/23 page 191 i

191

If xj is the entering variable, the new reduced costs will satisfy c¯l = cˆl − cˆj

aˆ s,l aˆ s,j

for l = 1, . . . , n.



(If l = j then c¯l = 0.) Since each c¯l must be nonnegative, the smallest ratio |cˆj /aˆ s,j | with aˆ s,j < 0 determines which reduced cost goes to zero first. (See the Exercises.) This ratio determines the pivot entry aˆ s,t . In our example below, the leaving variable is the one that is most negative. Any negative variable may be chosen as the leaving variable, and so other selection rules are possible. See Section 7.6.1. The ratio test requires the computation of cˆj aˆ s,j for any nonbasic variable j for which aˆ s,j < 0. Thus it is necessary to know the entries in the pivot row. If the full tableau is used, this information is available. Otherwise, the pivot row must be computed. The nonbasic entries in the entering row are given by esTB −1 Aj , where es is column s of the m × m identity matrix. These entries can be computed by first letting σ T = esTB −1 , that is, computing row s of B −1 , and then forming σ T Aj for all nonbasic variables j . The

costs of this last calculation are almost the same as the pricing step that computes cˆj in the primal method. (The vector es is a sparse vector, and this can be exploited to make the computations more efficient.) The update step is performed just as in the (primal) simplex method. If the full tableau is used, elimination operations are applied to transform the pivot column to a column of the identity matrix. Otherwise, the pivot column is computed using Aˆ t = B −1 At , and the reduced costs are updated using cˆj ← cˆj −

cˆt aˆ s,j . aˆ s,t

Finally xB and B −1 are updated. We now summarize the dual simplex method. At the initial basis, the reduced costs must satisfy cˆj ≥ 0. There are three major steps: the feasibility test, the step, and the update. 1. The Feasibility Test—If xB = bˆ = B −1 b ≥ 0, then the current basis is a solution. Otherwise, choose (xB )s as the leaving variable, where bˆs < 0.

i

i i

i

i

i

i

192

book 2008/10/23 page 192 i

Chapter 6. Duality and Sensitivity

2. The Step—In the pivot row (the row with entries aˆ s,j = esTB −1 Aj , where es is column s of the identity matrix) find an index t that satisfies      cˆt      = min  cˆj  : aˆ s,j < 0, xj nonbasic .  aˆ  1≤j ≤n  aˆ  s,t s,j This determines the entering variable xt and the pivot entry aˆ s,t . If no such index t exists, then the primal problem is infeasible and the dual problem is unbounded. 3. The Update—Represent the linear program in terms of the new basis. (Compute the pivot column Aˆ t = B −1 At , and update B −1 , xB , and the reduced costs c.) ˆ The next example illustrates the dual simplex method. Example 6.13 (Dual Simplex Method). Consider the linear program z = 2x1 + 3x2 3x1 − 2x2 ≥ 4 x1 + 2x2 ≥ 3 x1 , x2 ≥ 0.

minimize subject to

We will describe the dual simplex method using the full tableau. If excess variables but not artificial variables are added, then the tableau for this problem is basic x1 x2 x3 x4 rhs −z

2

3

0

0

0

3 1

−2 2

−1 0

0 −1

4 3

Consider the initial basis xB = (x3 , x4 )T. If we multiply the constraints by −1, we obtain basic

x1

x2

x3

x4

rhs

−z

2

3

0

0

0

x3 x4

−3 −1

2 −2

1 0

0 1

−4 −3

This basis is primal infeasible since both x3 and x4 are negative, but the primal optimality conditions are satisfied (the reduced costs are positive). The dual problem is maximize subject to

w = 4y1 + 3y2 3y1 + y2 ≤ 2 − 2y1 + 2y2 ≤ 3 y1 , y2 ≥ 0.

Although not necessary for the algorithm, the corresponding dual solution can be found from the formula y T = cBT B −1 . (We will compute the sequence of dual solutions in this

i

i i

i

i

i

i

6.3. The Dual Simplex Method

book 2008/10/23 page 193 i

193

example to emphasize that the dual simplex method is moving through a sequence of dual feasible solutions.) For this basis, the dual variables are y1 = y2 = 0 with dual objective w = 0. This point is dual feasible but not dual optimal. Throughout the execution of the dual simplex method, complementary slackness will be maintained and the primal and dual objectives will be equal. The current basis is not (primal) feasible. The most negative variable is x3 , so it will be the leaving variable. In the ratio test there is only one valid ratio, in the x1 column: basic

x1

x2

x3

x4

rhs

−z

2

3

0

0

0

x3 x4

−3 −1

2 −2

1 0

0 1

−4 ⇐ −3

We now apply elimination operations to obtain the new basic solution: basic

x1

x2

x3

x4

rhs

−z

0

13 3

2 3

0

− 83

x1

1

− 23

− 31

0

x4

0

− 83

− 31

1

4 3 − 53

The corresponding dual feasible solution is y1 = 23 , y2 = 0. At the next iteration, x4 is the only negative variable, so it will be the leaving variable. There are two ratios to consider in the ratio test:      13  13  2  3   3 and  1  = 2.  8 =  −3  −3  8 The first of these is smaller so x2 is the entering variable: basic

x1

x2

x3

x4

rhs

−z

0

13 3

2 3

0

− 83

x1

1

− 23

− 13

0

x4

0

− 83

− 13

1

4 3 − 53



After applying elimination operations we obtain basic

x1

x2

x3

x4

rhs

13 8

− 43 8 7 4 5 8

−z

0

0

1 8

x1

1

0

− 14

− 14

x2

0

1

1 8

− 38

i

i i

i

i

i

i

194

book 2008/10/23 page 194 i

Chapter 6. Duality and Sensitivity

. This basis is optimal and feasible, so we stop. The dual solution is y1 = 18 , y2 = 13 8 If the full tableau were not used, then the same sequence of bases would be obtained. The only difference would be that the pivot rows and columns would be computed at every iteration using the current basis matrix B.

Exercises 3.1. Use the dual simplex method to solve minimize subject to

z = 5x1 + 4x2 4x1 + 3x2 ≥ 10 3x1 − 5x2 ≥ 12 x1 , x2 ≥ 0.

3.2. Use the dual simplex method to solve minimize subject to

z = 5x1 + 2x2 + 8x3 2x1 − 3x2 + 2x3 ≥ 3 −x1 + x2 + x3 ≥ 5 x1 , x2 , x3 ≥ 0.

3.3. Use the dual simplex method to solve maximize subject to

z = −2x1 − 7x2 − 6x3 − 5x4 2x1 − 3x2 − 5x3 − 4x4 ≥ 20 7x1 + 2x2 + 6x3 − 2x4 ≤ 35 4x1 + 5x2 − 3x3 − 2x4 ≥ 15 x1 , x2 , x3 , x4 ≥ 0.

3.4. In step 2 of the dual simplex method, explain why the dual problem is unbounded if there is no admissible entering variable in the ratio test. Also, find a direction of unboundedness for the dual problem in such a case. 3.5. Prove that at each iteration of the dual simplex method, w = z =

cˆt bˆs ≥ 0, aˆ s,t

where w is the change in the dual objective function, and z is the change in the primal objective function. 3.6. Prove that in the step procedure of the dual simplex method the smallest ratio    cˆj     aˆ  : aˆ s,j < 0, xj nonbasic s,j determines which reduced cost goes to zero first. 3.7. Is it possible for a basic variable that is nonnegative to become negative in the course of the dual simplex?

i

i i

i

i

i

i

6.4. Sensitivity

book 2008/10/23 page 195 i

195

3.8. The following is a tableau obtained when solving a minimization linear programming problem via the dual simplex algorithm. basic

x1

x2

x3

x4

x5

x6

x7

rhs

−z

0

a

0

0

3

b

c

2

0 1 0

−1 1 h

1 0 0

3 d −2

−1 e −2

0 0 1

1 f −1

1 g 2

Find conditions on the parameters a, b, c, d, e, f, g, h such that the following are true. State the most general conditions that apply. (You do not have to mention those parameters that can take on any value from −∞ to +∞.) (i) (ii) (iii) (iv) (v)

The above tableau is a valid tableau for the dual simplex algorithm. A basic feasible solution to the problem has been found. The problem is infeasible. The problem is unbounded. The current solution is not feasible. According to the dual simplex method, the variable to enter the basis is x4 . (Assume that there are no ties.) (vi) x7 enters the basis, and the resulting solution is still infeasible.

3.9. In Exercises 3.1 and 3.2, apply the primal simplex method to the dual linear program, using bases that correspond to the iterations of the dual simplex method. Show that the two approaches are equivalent in these cases. 3.10. Suppose that the primal and dual simplex methods are implemented using the revised simplex tableau. Compare the operation counts for an iteration of both methods, if they are applied to a problem with n variables and m constraints. How are these operation counts affected when sparsity is taken into account? 3.11. Define dual degeneracy. Show (via an example) that degeneracy can cause the objective value to remain unchanged during an iteration of the dual simplex method. 3.12. Devise a “phase-1” procedure for the dual simplex method that would allow the method to be applied to any linear program. 3.13. Devise a “big-M” procedure for the dual simplex method that would allow the method to be applied to any linear program. Hint: Add a new variable and constraint.

6.4

Sensitivity

The purpose of sensitivity analysis is to determine how the solution of a linear program changes when changes are made to the data in the problem. This is an important practical technique, since it is rare that the data in a model are known exactly. For example, the linear program might represent a model of the economy, and one of the entries in the model might be the predicted inflation rate six months in the future. This rate can only be guessed at, and so it would be worrisome if the solution to the linear program was especially sensitive to its

i

i i

i

i

i

i

196

book 2008/10/23 page 196 i

Chapter 6. Duality and Sensitivity

estimated value. The developer of the model might wish to know the effect on the objective value of a change in the right-hand side of one of the constraints. Or what happens when the cost coefficients change, or when a new constraint is added to the problem. Another possibility is that a particular entry in the model lies in some interval, and hence it would be desirable to know the solution of the linear program for all permissible values of this parameter. This situation might arise, for example, if the model of the economy included the number of unemployed workers, a number that might be estimated in the form 7, 000, 000 ± 450, 000. Sensitivity analysis is designed to answer such questions. Sensitivity analysis attempts to answer these questions without having to re-solve the problem. The idea is to start from the information provided by the optimal basis to answer these “what if” questions. When performing sensitivity analysis it is also possible to determine the range of values that a perturbation can take without changing the optimal basis. Within this range, the values of the variables may change, but the basis will remain constant. In particular, the nonbasic variables will remain equal to zero. This could be of value, for example, if each variable represented the number of hours that an employee were assigned to a task, so that the optimal basis would determine the staffing required, even if the actual number of hours worked by each employee might vary. Most software packages for linear programming provide sensitivity information as well as range information for each objective coefficient and for the right-hand side of each constraint. Our techniques depend on the feasibility and optimality conditions for a linear program. The current basis is feasible if B −1 b ≥ 0. It is optimal if

cNT − cBT B −1 N ≥ 0.

From a mathematical point of view, all of sensitivity analysis can be considered as a consequence of these formulas. We will consider only the simpler cases, but the approach is general: • Do the changes in the data affect the optimality conditions? How much can the data change before the optimality conditions are violated? If the current basis is no longer optimal, apply the primal simplex method to restore optimality. • Do the changes in the data affect the feasibility conditions? How much can the data change before the feasibility conditions are violated? If the current basis is no longer feasible, apply the dual simplex method to restore feasibility. We will examine these ideas via an example. Example 6.14 (Sensitivity Analysis). Consider the linear program minimize subject to

z = −x1 − 2x2 −2x1 + x2 ≤ 2 −x1 + 2x2 ≤ 7 x1 ≤ 3 x1 , x2 ≥ 0.

i

i i

i

i

i

i

6.4. Sensitivity

book 2008/10/23 page 197 i

197

The optimal solution is given by basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

1

2

13

0 0

1 2

1 2

0

1

5 3

1

− 12

3 2

3

x2 x1 x3

0 1 0

1 0 0

The current basis is xB = (x2 , x1 , x3 )T, and    1 1  0 1 −2 1 2 2 −1 B = 2 −1 0 , B = 0 0 1 , 0 1 0 1 − 12 32    1 1 0 0 2 2 −1 N= 1 0 , B N= 0 1 , 0 1 − 12 32     −2 0 , y T = cBT B −1 = ( 0 cB = −1 , cN = 0 0   5 B −1 b = 3 , cˆNT = cNT − y TN = ( 1 2 ) . 3

−1

−2 ) ,

Here y is the vector of optimal dual variables. We now perturb the linear program in various ways. Each of these changes will be independent and will be applied to the original linear program. Suppose that the right-hand side of the second constraint is perturbed. We will denote this by b¯2 = b2 +δ, where b¯2 is the new right-hand-side value, and δ is the perturbation. This is a change of the form b¯ = b + b for some vector b. In this case b = (0, δ, 0)T. This change has no effect on the optimality conditions since they do not involve the righthand side. However, it does affect the feasibility conditions: B −1 b¯ ≥ 0. The feasibility condition will remain satisfied as long as B −1 (b + b) ≥ 0, or equivalently, as long as B −1 b ≥ −B −1 b. For this example, this condition is    1  5 −2δ 3 ≥ 0 . 1 3 δ 2 That is, the basis does not change if −10 ≤ δ ≤ 6. The new value of the objective function will be z¯ = cBT B −1 b¯ = y T(b + b) = T z + y b. This shows that z = y T b. For this example, z¯ = z + y2 δ = −13 − δ. If δ = −4, then the basis will not change, and       5 −2 3 −1 x¯B = xB + B b = 3 + 0 = 3 3 2 5 z¯ = z + y T b = −13 − 1(−4) = −9.

i

i i

i

i

i

i

198

book 2008/10/23 page 198 i

Chapter 6. Duality and Sensitivity

No other values are affected. If δ = 8, then the basis changes, since       5 4 9 −1 x¯B = xB + B b = 3 + 0 = 3 ≥ 0 3 −4 −1 z¯ = z + y T b = −13 − 1(8) = −21 is infeasible. In terms of the current basis the perturbed problem is basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

1

2

21

x2 x1

0 1

1 0

0 0

1 2

1 2

0

1

9 3

x3

0

0

1

− 12

3 2

−1



The reduced costs are unchanged, and hence the optimality conditions remain satisfied. The dual simplex method can be applied to obtain the new solution basic

x1

x2

x3

x4

x5

rhs

−z

0

0

2

0

5

19

x2 x1 x4

0 1 0

1 0 0

1 0 −2

0 0 1

2 1 −3

8 3 2

Suppose now that the coefficient of x2 in the objective is changed: c¯2 = c2 +δ. This is a change in the cost coefficient of a basic variable, that is, a change of the form c¯B = cB + cB with cB = (δ, 0, 0)T. This affects the optimality condition cNT − c¯BT B −1 N ≥ 0, but not the feasibility condition. The optimality condition will remain satisfied if the new reduced costs are nonnegative: cNT − (cB + cB )TB −1 N = cˆNT − cBT B −1 N ≥ 0, that is, if

cˆNT ≥ ( cB )TB −1 N.

Substituting the data listed at the beginning of this example, we obtain  1 1 (1

2) ≥ (δ

0

0)

2

2

0

1

− 12

3 2

or (1

2 ) ≥ ( 12 δ

1 δ). 2

i

i i

i

i

i

i

6.4. Sensitivity

book 2008/10/23 page 199 i

199

This will be satisfied if δ ≤ 2. If δ = 1, the current basis remains optimal and the reduced costs become cˆNT − cBT B −1 N = ( 1 − 12 δ

2 − 12 δ ) = ( 12

3 2

) ≥ 0.

The new value of the objective is z¯ = c¯BT B −1 b = (cBT + cBT )xB = z + ( cB )TxB . In this case z¯ = z + δx2 = z + 5δ = −13 + 5(1) = −8. If δ = 4, the current basis is no longer optimal. The reduced costs for x4 and x5 become ( 1 − 12 δ 2 − 12 δ ) = ( −1 0 ) ≥ 0. The new value of the objective is z¯ = z + 5δ = −13 + 5(4) = 7. We apply the primal simplex method to the perturbed problem:

basic

x1

x2

x3

⇓ x4

x5

rhs

−z

0

0

0

−1

0

−7

x2

0

1

0

1 2

1 2

5

x1

1

0

0

0

1

3

3 2

3

0

0

1

− 12

basic

x1

x2

x3

x4

x5

rhs

−z

0

2

0

0

1

3

x4 x1 x3

0 1 0

2 0 1

0 0 1

1 0 0

1 1 2

10 3 8

x3 The new optimal basic solution is

As a final illustration we consider the addition of a new variable x3 to the problem. Suppose that its coefficient in the objective is c3 and its coefficients in the constraints are   a1,3 A3 = a2,3 . a3,3 We will also assume that the new variable x3 is constrained to be nonnegative. The current basic feasible solution is also a basic feasible solution to the augmented problem (the problem that includes x3 ) if x3 is included as a nonbasic variable. Is the current

i

i i

i

i

i

i

200

book 2008/10/23 page 200 i

Chapter 6. Duality and Sensitivity

basis optimal? We must check if the reduced cost for x3 satisfies cˆ3 ≥ 0. This condition has the form cˆ3 = c3 − y TA3 ≥ 0. If cˆ3 ≥ 0, then no further work is necessary: the current basis will remain optimal with x3 = 0. If cˆ3 < 0, then the current basis is not optimal. A new column will be added to the problem (corresponding to x3 ) and the primal simplex method will be applied to determine the new optimal basis. If c3 = 4 and A3 = (5, −3, 4)T, then the optimality condition for x3 is  4 − (0

−1

−2 )

5 −3 4

 =9≥0

so the new variable does not affect the solution. If c3 = 2 and A3 = (4, −5, 1)T, then the optimality condition for x3 is  2 − (0

−1

−2 )

4 −5 1

 = −1 ≥ 0

so the current solution is no longer optimal. The entries in the new column are obtained by computing B −1 A3 :  B

−1

A3 =

1 0 2 0 0 1 − 12

1 2



1 3 2

4 −5 1



 =

−2 1 8



so that the augmented problem becomes

basic

x1

x2

⇓ x3

x3

x4

x5

rhs

−z

0

0

−1

0

1

2

13

x2 x1 x3

0 1 0

1 0 0

−2 1 8

0 0 1

1 2

1 2

5 3 3

0

1

− 12

3 2

The new optimal basic solution is basic

x1

x2

x3

x3

x4

x5

rhs

15 16

35 16

107 8

3 8 1 16 1 − 16

7 8 13 16 3 16

23 4 21 8 3 8

−z

0

0

0

1 8

x2

0

1

0

x1

1

0

0

x3

0

0

1

1 4 − 18 1 8

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 201 i

201

Some general rules can be stated for doing sensitivity analysis. In the following we denote the reduced costs by cˆNT = cNT − cBT B −1 N . • Change in the right-hand side—If b¯ = b + b, then determine if the current basis is still feasible by checking if bˆ ≥ −B −1 b. If so, then x¯B = xB + B −1 b and z¯ = z + y T b. (The vector y is the vector of dual variables.) If not, apply the dual simplex method to the perturbed problem to restore feasibility. • Change to an objective coefficient (nonbasic variable)—If c¯N = cN + cN , then determine if the basis is still optimal by checking if cˆNT ≥ −( cN )T. If the basis does not change, then there are no changes to the variables or to the objective. If the basis does change, then apply the primal simplex method to the perturbed problem to restore optimality. • Change to an objective coefficient (basic variable)—If c¯B = cB + cB , determine if the basis is still optimal by checking if cˆNT ≥ ( cB )TB −1 N . If the basis does not change, then y¯ = y + B −T cB and z¯ = z + ( cB )TxB . If the basis does change, apply the primal simplex method to the perturbed problem to restore optimality. • New constraint coefficients (nonbasic variable)—If N¯ = N + N , then determine if the current basis is still optimal by checking if cˆNT ≥ cBT B −1 N . If the basis does not change, then there are no changes to the variables or to the objective. If the basis does change, then apply the primal simplex method to restore optimality. • New variable—If xt is a new variable with objective coefficient ct and constraint coefficients At = (a1,t , . . . , am,t )T, then determine if the current basis is still optimal by testing if ct − y TAt ≥ 0. If it is, then there are no changes to the variables or to the objective. If it is not, then apply the primal simplex method to restore optimality. • New constraint—See the Exercises. It is also possible to change the coefficients of the constraints corresponding to a basic variable, or to have a combination of changes of the above forms. In these cases it might happen that the current basis would be neither feasible nor optimal for the new problem, so that neither the primal nor the dual simplex method could be applied directly to find the new solution. It would be necessary to use some sort of phase-1 procedure to find a basic feasible solution to the new problem before applying the primal simplex method. This might not be any faster than solving the new problem from scratch.

Exercises 4.1. The following questions apply to the linear program in Example 6.14. Each of the questions is independent. (i) By how much can the right-hand side of the first constraint change before the current basis ceases to be optimal? (ii) What would the new solution be if the right-hand side of the third constraint were increased by 5? (iii) What would the new solution be if the coefficient of x1 in the objective were decreased by 2? Increased by 2?

i

i i

i

i

i

i

202

book 2008/10/23 page 202 i

Chapter 6. Duality and Sensitivity (iv) Would the current basis remain optimal if a new variable x3 were added to the model with objective coefficient c3 = 5 and constraint coefficients A3 = (−2, 4, 5)T?

4.2. Show how to update the solution to a linear program when a new constraint is added. (i) Consider first a constraint of the form a1 x1 + a2 x2 + · · · + an xn ≤ β. There are two cases: (a) when the current optimal solution satisfies the new constraint, and (b) when the current optimal solution violates the new constraint. (ii) Next, consider a constraint of the form a1 x1 + a2 x2 + · · · + an xn = β. In this case, an artificial variable may have to be added to the constraint, and a big-M term may have to be added to the objective. (iii) How can a constraint of the form a1 x1 + a2 x2 + · · · + an xn ≥ β be handled? 4.3. The following questions below apply to the linear program maximize subject to

with optimal basis { x1 , x2 , x3 } and  B

−1

=

z = 3x1 + 13x2 + 13x3 x1 + x2 ≤ 7 x1 + 3x2 + 2x3 ≤ 15 2x2 + 3x3 ≤ 9 x1 , x2 , x3 ≥ 0

5/2 −3/2 1

−3/2 3/2 −1

1 −1 1

 .

All of the questions are independent. (i) What is the solution to the problem? What are the optimal dual variables? (ii) What is the solution of the linear program obtained by decreasing the right-hand side of the second constraint by 5? (iii) By how much can the right-hand side of the first constraint increase and decrease without changing the optimal basis? (iv) What is the solution of the linear program obtained by increasing the coefficient of x2 in the objective by 15? (v) By how much can the objective coefficient of x1 increase and decrease without changing the optimal basis?

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 203 i

203

(vi) Would the current basis remain optimal if a new variable x4 were added to the model with objective coefficient c4 = 5 and constraint coefficients A4 = (2, −1, 5)T? (vii) Determine the solution of the linear program obtained by adding the constraint x1 − x2 + 2x3 ≤ 10. (viii) Determine the solution of the linear program obtained by adding the constraint x1 − x2 + x3 ≥ 6. (ix) Determine the solution of the linear program obtained by adding the constraint x1 + x2 + x3 = 10. 4.4. The following questions below apply to the linear program z = −101x1 + 87x2 + 23x3 6x1 − 13x2 − 3x3 ≤ 11 6x1 + 11x2 + 2x3 ≤ 45 x1 + 5x2 + x3 ≤ 12 x1 , x2 , x3 ≥ 0

minimize subject to

with optimal basic solution basic

x1

x2

x3

x3

x4

x5

rhs

−z

0

0

0

12

4

5

372

x1 x2 x3

1 0 0

0 1 0

0 0 1

1 −4 19

−2 9 −43

7 −30 144

5 1 2

All of the questions are independent. (i) What is the solution of the linear program obtained by decreasing the right-hand side of the second constraint by 15? (ii) By how much can the right-hand side of the second constraint increase and decrease without changing the optimal basis? (iii) What is the solution of the linear program obtained by increasing the coefficient of x1 in the objective by 25? (iv) By how much can the objective coefficient of x3 increase and decrease without changing the optimal basis? (v) Would the current basis remain optimal if a new variable x4 were added to the model with objective coefficient c4 = 46 and constraint coefficients A4 = (12, −14, 15)T? (vi) Determine the solution of the linear program obtained by adding the constraint 5x1 + 7x2 + 9x3 ≤ 50.

i

i i

i

i

i

i

204

book 2008/10/23 page 204 i

Chapter 6. Duality and Sensitivity (vii) Determine the solution of the linear program obtained by adding the constraint 12x1 − 15x2 + 7x3 ≥ 10. (viii) Determine the solution of the linear program obtained by adding the constraint x1 + x2 + x3 = 30.

6.5

Parametric Linear Programming

Parametric linear programming is a form of sensitivity analysis, but one in which a range of values of the objective or the right-hand side is analyzed. For the case of the objective, we will examine problems of the form minimize subject to

z = (c + α c)Tx Ax = b x ≥ 0,

where the parameter α is allowed to range over all positive and negative values. If the right-hand side were allowed to vary, then the problems would be of the form minimize subject to

z = cTx Ax = b + α b x ≥ 0.

We will concentrate on the case where the objective coefficients are varied. Parametric programming can be of value in applications where the coefficients in the model are uncertain and are only known to lie within particular intervals. It can also be valuable when there are two conflicting objective functions, for example, one representing minimum cost (cTx) and the other representing minimum time (c¯Tx). To understand the trade-offs between the two, a compromise objective function might be used: z = (1 − α)cTx + α c¯Tx = cTx + α(c¯ − c)Tx. This function is of the desired form with c = c − c. ¯ In this application, only values of α in the interval [0, 1] would be relevant. We will assume that the linear program has been solved with α = 0, that is, with objective function z = (c + α c)Tx = cTx. Techniques from sensitivity analysis will be used to examine how the solution changes as α is varied from zero. If the current basis remains optimal, then the current basic feasible solution xB = B −1 b will not change. Hence only the optimality conditions need be examined. For the perturbed problem they are (cN + α cN )T − (cB + α cB )TB −1 N ≥ 0 or

α( cNT − cBT B −1 N ) ≥ −(cNT − cBT B −1 N ),

i

i i

i

i

i

i

6.5. Parametric Linear Programming

book 2008/10/23 page 205 i

205

where cN and cB represent the perturbations to cN and cB , respectively. This inequality must be satisfied for every component in the optimality test. The coefficients on the right-hand side (that is, the reduced costs from the simplex method) satisfy cˆNT = cNT − cBT B −1 N ≥ 0 since the current basis is assumed to be optimal. For α > 0, the inequality is of interest only when ( cNT − cBT B −1 N )i < 0. As a result, α can be increased up to the value  (cNT − cBT B −1 N )i : ( cNT − cBT B −1 N )i < 0 α¯ = min − i ( cNT − cBT B −1 N )i before the current basis ceases to be optimal. For α > α¯ the basis changes, and the index i that determines α¯ specifies the entering variable for the simplex method. Similarly, for α < 0, it is possible to decrease α up to the value  (cNT − cBT B −1 N )i : ( cNT − cBT B −1 N )i > 0 α = max − i ( cNT − cBT B −1 N )i before the current basis ceases to be optimal. Again, the index i that determines α determines the entering variable. For α ∈ [α, α] ¯ the reduced costs for the nonbasic variables are given by the formula (cNT − cBT B −1 N ) + α( cNT − cBT B −1 N ). The parametric objective value is given by z(α) = z(0) + α cBT xB , where z(0) is the objective value for the problem with α = 0. If, when attempting to calculate α, ¯ there is no index that satisfies ( cNT − cBT B −1 N )i < 0, then α can be increased without bound with the current basis remaining optimal. If, when applying the simplex method to determine the new basis at α, ¯ there is no leaving variable, then the linear program is unbounded for α > α. ¯ Similarly, if there is no index that satisfies ( cNT − cBT B −1 N )i > 0, then α can be decreased without bound with the current basis remaining optimal, and if there is no leaving variable at α, then the linear program is unbounded for α < α. Parametric linear programming is illustrated in the following example. Example 6.15 (Parametric Linear Programming). We will examine the linear program from Example 6.12: minimize z = −x1 − 2x2 subject to −2x1 + x2 ≤ 2 −x1 + 2x2 ≤ 7 x1 ≤ 3 x1 , x2 ≥ 0

i

i i

i

i

i

i

206

book 2008/10/23 page 206 i

Chapter 6. Duality and Sensitivity

with optimal basic solution basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

1

2

13

x2

0 1

1 0

0 0

1 2

1 2

0

1

5 3

1

− 12

3 2

3

x1

0

x3

0

Consider the parametric objective function z(α) = (c + α c)Tx with c = ( −1

−2

0

0

0 )T

and

c = ( 2

3

0

0

0 )T ,

so that cB = (3, 2, 0)T and cN = (0, 0)T. For the original problem with α = 0 the optimal basis is xB = (x2 , x1 , x3 )T. The values of B, cB , etc. are listed in Example 6.12. To determine how much α can be varied without changing the basis, we calculate  3   −2 1 T T T −1 . and c ˆ = c − c B N = cNT − cBT B −1 N = N N B 2 −7 2

Since there is no entry satisfying ( cNT − cBT B −1 N )i > 0, α can be decreased without bound, with the current basis remaining optimal. However, we can compute an upper bound on the range of α:

α¯ = min 23 , 47 = 47 and x5 is the entering variable for this value of α. The nonbasic reduced costs are  3     −2 1 − 32 α 1 +α = 2 2 − 72 α − 72 and the objective value is z(α) = −13 + αcBT xB = −13 + 21α. Hence for α = α¯ = 47 , the coefficients in terms of the current basis are basic

x1

x2

x3

x4

⇓ x5

rhs

−z

0

0

0

1 7

0

1

1 2

5

x2 x1 x3

0

1

0

1 2

1

0

0

0

1

3

1

− 12

3 2

3

0

0

i

i i

i

i

i

i

6.5. Parametric Linear Programming

book 2008/10/23 page 207 i

207

After pivoting, the new optimal basic solution is basic

x1

x2

x3

x4

x5

rhs

−z

0

0

0

1 7

0

1

x2

0

1

− 13

0

4

− 23 2 3

2 3 1 3 − 13

0

1

1

2

x1

1

0

x5

0

0

The whole process can now be repeated using the new basis. To determine how much α can be increased we use the new basis to calculate  7   0 3 T T −1 T T T −1 cN − cB B N = and cˆN = cN − cB B N = 1 . 8 −3 7 Then α¯ =

3 56

and x4 is the entering variable for α = 47 + α. ¯ (Note that we are calculating how much further α can be increased from its current value of 47 .) The nonbasic reduced costs are    7 0 3 4 + (α − 7 ) 1 − 83 7 and the objective value is z(α) = −1 + 14(α − 47 ). For α −

4 7

=

3 56

we obtain

basic

x1

x2

x3

⇓ x4

x5

rhs

−z

0

0

1 8

0

0

1 4

x2

0

1

− 13

0

4

− 23 2 3

2 3 1 3 − 13

0

1

1

2

x1

1

0

x5

0

0

After pivoting, the new optimal basic solution is basic

x1

x2

x3

x4

x5

rhs

−z

0

0

1 8

0

0

1 4

x2

−2 3

1 0

1 −2

0 1

0 0

2 3

1

0

0

0

1

3

x4 x5

i

i i

i

i

i

i

208

book 2008/10/23 page 208 i

Chapter 6. Duality and Sensitivity To determine how much further α can be increased we calculate     8 0 and cˆNT = cNT − cBT B −1 N = 1 . cNT − cBT B −1 N = −3 8

Then α¯ =

1 24

3 and x3 is the entering variable for α = 47 + 56 + α¯ = 58 + α. ¯ The nonbasic reduced costs are     8 0 5 + (α − 8 ) 1 −3 8

and the objective value is z(α) = − 14 + 6(α − 58 ). For α −

5 8

=

1 24

we obtain

basic

x1

x2

⇓ x3

x4

x5

rhs

−z

1 3

0

0

0

0

0

x2 x4

−2

1

1

0

0

2

3 1

0 0

−2 0

1 0

0 1

3 3

x5

After pivoting, the new optimal basic solution is basic

x1

x2

x3

x4

x5

rhs

−z

1 3

0

0

0

0

0

x3 x4 x5

−2 −1

1 2

1 0

0 1

0 0

2 7

1

0

0

0

1

3

For this basis cNT − cBT B −1 N =

  2 >0 3

so there is no entering variable and the current basis remains optimal for all larger values of α. Also, since cB = (0, 0, 0)T for this basis, the objective value remains constant as α increases. To summarize: If α ∈ (−∞, 47 ], then xB = (x1 , x2 , x3 )T z(α) = −13 + 21α.

i

i i

i

i

i

i

6.5. Parametric Linear Programming

book 2008/10/23 page 209 i

209

2

z 0 -2 -4 -6 -8 -10 -12 -14 -16 -18 -0.2

0

0.2

0.4

0.6

0.8

1

α

Figure 6.1. Parametric objective function. If α ∈ [ 47 , 58 ], then xB = (x1 , x2 , x5 )T z(α) = −1 + 14(α − 47 ) = −9 + 14α. If α ∈ [ 58 , 23 ], then xB = (x1 , x4 , x5 )T z(α) = − 14 + 6(α − 58 ) = −4 + 6α. If α ∈ [ 23 , +∞), then xB = (x3 , x4 , x5 )T z(α) = 0. The graph of the objective value as a function of α is plotted in Figure 6.1. For the example, the value of the parametric objective function is piecewise linear and concave. This result is true in general for parametric linear programs (see the Exercises). A similar technique can be developed for solving problems of the form minimize

z = cTx

subject to

Ax = b + α b x ≥ 0.

The technique can be derived in one of two ways: either directly using sensitivity analysis, or by applying parametric analysis to the dual linear program. Regardless of how it is derived, the dual simplex method is used to find the new basis for each critical value of α. See the Exercises.

i

i i

i

i

i

i

210

book 2008/10/23 page 210 i

Chapter 6. Duality and Sensitivity

Parametric linear programming can be used as a general technique for solving linear programming problems. To develop this idea we assume that an initial basic feasible solution is available. (If not, a two-phase or big-M approach could be used to initialize the method.) This basis is used to define an artificial objective function c¯ with respect to which the initial basis is optimal. One possible choice would be c¯N = ( 1 c¯B = ( 0

· · · 1 )T · · · 0 )T ,

so that c¯NT − c¯BT B −1 N = ( 1

· · · 1 )T ≥ 0.

Then the parametric programming method is applied to the linear program with objective function z = (1 − α)c¯Tx + αcTx = c¯Tx + α(c − c) ¯ Tx, where c is the original vector of objective coefficients. The solution for α = 1 is the solution to the original problem. This technique is sometimes called the shadow vertex method.

Exercises 5.1. Apply parametric linear programming to the linear program in Example 6.13. The original objective uses c = (2, 3, 0, 0)T. Use c = (4, 1, 0, 0)T. 5.2. Consider a linear program with parametric objective function minimize z = (c + α c)Tx. Prove that the optimal value z(α) is a concave, piecewise linear function of α. 5.3. Derive a parametric linear programming algorithm to solve minimize

z = cTx

subject to

Ax = b + α b x≥0

for α ≥ 0. Assume that an optimal basis is known for the problem with α = 0. 5.4. Apply the algorithm obtained in the previous problem to the linear program in Example 6.12. Use b = (4, 1, 1)T. 5.5. Use the shadow vertex method to solve the linear program in Example 6.14. Use the initial basis xB = (x3 , x4 , x5 )T and xN = (x1 , x2 )T, and let the artificial objective function have coefficients c¯N = (1, 1)T

and

c¯B = (0, 0, 0)T.

i

i i

i

i

i

i

6.6. Notes

6.6

book 2008/10/23 page 211 i

211

Notes

Duality—Duality theory for linear programming was first developed by von Neumann (1947), but the first published result is in the paper by Gale, Kuhn, and Tucker (1951). Von Neumann’s result built upon his earlier work in game theory. Farkas’ lemma (Exercise 2.14) was proved (in a slightly different form) by Julius Farkas in 1901 and was used in the work of Gale, Kuhn, and Tucker. The existence of a strictly complementary primal-dual optimal pair for any linear program with a finite optimum is due to Goldman and Tucker (1956). Further historical discussion of duality theory can be found in Section 14.9. The Dual Simplex Method—The dual simplex method was first described in the papers of Lemke (1954) and Beale (1954). Parametric Programming—Parametric programming was first developed in the paper by Gass and Saaty (1955). A more recent survey of works on this topic can be found in the book by Gal (1979). On degenerate problems there is a possibility that the method described here can cycle but, as with the simplex method, it is possible to modify the method so that it is guaranteed to terminate. The papers by Dantzig (1989) and Magnanti and Orlin (1988) describe techniques for doing this. The paper by Klee and Kleinschmidt (1990) explains when cycling can occur. The shadow vertex method is not widely used for practical computations, but it is used theoretically to study the average-case behavior of the simplex method, that is, the expected performance of the simplex method on a random problem. (See Section 9.5.)

i

i i

i

i

book 2008/10/23 page 212 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 213 i

Chapter 7

Enhancements of the Simplex Method

7.1

Introduction

In previous chapters, we made use of the formulas for the simplex method but paid less attention to the computational details of the method. In particular, we did not explain how the basis matrix was represented. One possibility would be to use the explicit inverse of the basis matrix. This can be a sensible choice when solving small problems using hand calculations; however, it is inefficient for solving large- or even moderate-size problems. It is also inflexible—it is less able to take advantage of linear programs that have special structure, and thereby less able to achieve computational savings within the simplex method. An important goal of this chapter is to focus on the essentials of the simplex method and to move away from the obvious interpretations of its formulas. The simplex method consists of three major steps: the optimality test that identifies, if the current basis is not optimal, the entering variable; the step procedure that determines the leaving variable and the new basis; and the update that changes the basis. As long as these calculations can be performed, the simplex method can be used, regardless of how the calculations are organized. Many of the techniques we describe are designed to permit the solution of large problems, for which matrix inverses are particularly ill suited. Consider, for example, a problem with m = 10,000 equalities. Practical problems of this size or larger are not uncommon. The overwhelming majority of such large problems are sparse, with typically only a handful of nonzero elements in each column of the constraint matrix and possibly the right-hand side vector as well. Suppose our problem has, say, a total of 50,000 nonzero elements in the basis matrix. Then this matrix can be stored in a compact form by recording only the values of the nonzero elements and their row indices. If the basis matrix were inverted, its inverse might be dense, and updating this inverse would require updating all m2 = 100,000,000 nonzero entries. The computational effort required to perform these updates over thousands of iterations would be prohibitive. This is the major disadvantage of using matrix inverses in the simplex method: they do not exploit sparsity. Section 7.2 discusses a type of problem with special structure. Many linear programming models include upper bounds on the variables. In earlier chapters we treated these 213

i

i i

i

i

i

i

214

book 2008/10/23 page 214 i

Chapter 7. Enhancements of the Simplex Method

upper bounds as general constraints. However, it is possible to handle these upper bounds in much the same way as the nonnegativity constraints on the variables, with considerable computational savings. The resulting simplex method is only slightly more complicated than for a problem in standard form. In some linear programming models it can be inconvenient or expensive to generate the coefficients associated with a variable. It is possible to implement the simplex method in such a way that these coefficients are only generated as needed. The hope is that the linear program can be optimized by examining only a subset of the coefficients, and hence avoid unnecessary calculations. This technique is called column generation and is the subject of Section 7.3. Column generation is applied in Section 7.4 to problems whose constraints are divided into two groups: one group of “easy” constraints, and another (usually small) group of “hard” constraints. This special problem structure can be exploited using the decomposition principle. No matter how the simplex method is described, its ultimate effectiveness depends on how it is implemented in software. Details of the algorithm that are mathematically routine may require considerable transformation to turn them into efficient software. These ideas are discussed in Sections 7.5 and 7.6. Section 7.5 discusses the representation of the basis matrix. If sparsity is handled effectively, the storage requirements and computational effort required to solve large linear programs can be dramatically reduced. The many topics discussed in this chapter have a joint goal. They aim to generalize our view of the simplex method to obtain a more powerful method capable of solving problems with millions of variables. There are only a few basic steps that are necessary to define the simplex method, and a focus on these basics serves as a unifying theme running through these seemingly disparate topics. For the most part, the sections in this chapter can be read independently of each other. The only exception is Section 7.4 on the decomposition principle, which is easier to understand if Section 7.3 on column generation has already been read.

7.2

Problems with Upper Bounds

It is common in linear programming models to include upper bound constraints on the variables. These might represent upper limits on demand for a product, or perhaps just limits on allowable values (for example, a probability cannot be greater than one). In integer programming, where some or all of the variables are constrained to be integers, upper bound constraints are included to reduce the size of the feasible region, and hence reduce the amount of time required to compute a solution. An upper bound constraint can be treated as a general linear constraint, and in fact we have used this approach in earlier sections. This is computationally wasteful, however. It increases the size of the problem by one general constraint and by one slack variable, and it does not take full advantage of the special form of these constraints. Upper bound constraints can be handled within the simplex method almost as easily as nonnegativity constraints. We will discuss how to do this below. In fact, general bound constraints ≤x≤u

i

i i

i

i

i

i

7.2. Problems with Upper Bounds

book 2008/10/23 page 215 i

215

can be incorporated. We restrict our attention to constraints of the form 0≤x≤u so as to simplify the presentation. We also assume that u > 0, and that all the components of u are finite. Techniques for more general problems are left to the Exercises. To develop the method, we require a more general definition of a basic feasible solution. Up to now we have assumed that the nonbasic variables are set equal to zero, their lower bound. With upper bounds present, we will allow the nonbasic variables to be equal to their lower bound (zero) or equal to their upper bound. For example, for the constraints x1 + 2x2 = 4 0 ≤ x1 ≤ 5, 0 ≤ x2 ≤ 1 one basic feasible solution would be xB = (x1 ) = (4) xN = (x2 ) = (0) and another would be xB = (x1 ) = (2) xN = (x2 ) = (1). The same basis can lead to two different basic feasible solutions. Since xN = 0 when upper bounds are present, some of the formulas for the simplex method will become more complicated. Let us define this new form of basic feasible solution more precisely. Consider a linear program of the form minimize

z = cTx

subject to

Ax = b 0 ≤ x ≤ u,

where u > 0 and A is an m × n matrix of full row rank. A point x will be an (extended) basic feasible solution to this problem if (i) x satisfies the constraints of the linear program, and (ii) the columns of the constraint matrix corresponding to the components of x that are strictly between their bounds are linearly independent. The new definition of basic feasible solution is consistent with the old definition applied to the standard form of the problem, as the next lemma shows. Lemma 7.1. An extended basic feasible solution for the bounded-variable problem is equivalent to a basic feasible solution to the problem in standard form minimize z = cTx subject to Ax = b x+s =u x, s ≥ 0. Proof. Consider a feasible solution (x, s) for the standard form. We may assume that x can be split into the following three pieces: the first k components of x strictly between their

i

i i

i

i

i

i

216

book 2008/10/23 page 216 i

Chapter 7. Enhancements of the Simplex Method

bounds, the next  components at their upper bounds, and the remaining n−k− components equal to zero. Then the first k components of s are positive, the next  components are zero, and the remaining n − k −  components are positive. Let A1 and A2 be the submatrices of A corresponding to the first two pieces of x, respectively. Let Bˆ be the matrix consisting of the constraint coefficients corresponding to the positive components of x and s: ⎛ ⎞ A 1 A2 Ik ⎜I ⎟ Bˆ = ⎝ k ⎠. I In−k− (Here Ik denotes a k × k identity matrix, etc.) The columns of Bˆ are linearly independent (and hence x is a basic feasible solution in the old sense) if and only if there are no nontrivial solutions to A 1 α 1 + A 2 α2 α1 + α3 α2 α4

=0 =0 =0 =0

and hence there are no nontrivial solutions to A1 α1 = 0 α2 = α4 = 0 α3 = −α1 . This shows that the columns of Bˆ are linearly independent if and only if the columns of A1 are linearly independent. Since A1 is also the coefficient matrix corresponding to the components of x that are strictly between their bounds, then x is a basic feasible solution in the new sense if and only if (x, s) is a basic feasible solution in the old sense. Let us now return to the problem with upper bounds z = cTx Ax = b 0≤x≤u and assume that an initial feasible basis is provided. (A two-phase or big-M approach can be used to find an initial basis.) Corresponding to the basis, we can identify m basic variables xB and n − m nonbasic variables xN so that the constraints take the form BxB + N xN = b, where B is an m × m invertible matrix. Hence, minimize subject to

xB = B −1 b − B −1 N xN . The nonbasic variables will be either zero or at their upper bound. If this formula is substituted into the objective function we obtain z = cBT xB + cNT xN = y Tb + (cNT − y TN )xN

cˆj xj , = y Tb + j ∈N

i

i i

i

i

i

i

7.2. Problems with Upper Bounds

book 2008/10/23 page 217 i

217

where y T = cBT B −1 , and N is the index set for the nonbasic variables. As before, the optimality test is based on the reduced costs cˆj = cj − y TAj , although the test is more complicated in this case. If the nonbasic variable xj is zero and if cˆj ≥ 0, then the solution will not improve if xj enters the basis. (If xj is increased from zero, then the objective function will not decrease.) In addition, if xj is at its upper bound and if cˆj ≤ 0, then again the solution will not improve if xj enters the basis. (If xj is decreased from its upper bound, then the objective function will not decrease.) If the optimality test is not satisfied, then any violation can be used to determine the entering variable xt . As before, the entering column is Aˆ t = B −1 At . The ratio test for determining the leaving variable is also more complicated than before. One of three things can happen as the entering variables is changed: (a) the “entering” variable can move from one bound to another with the basis unchanged, (b) a basic variable can increase and leave the basis by going to its upper bound, or (c) a basic variable can decrease and leave the basis by going to zero. Cases (b) and (c) can be further refined depending on whether the entering variable is equal to zero or to its upper bound. The ratio test must determine which of these things happens first. Since every variable has finite upper and lower bounds, the problem cannot be unbounded. In more general problems with infinite upper bounds, unboundedness would be a possibility. We now derive the ratio test, and hence determine the leaving variable. Suppose that the entering variable xt is changed by α. Then the vector of basic variables will change from its current value bˆ to xB = bˆ − αAˆ t . To maintain feasibility with respect to the bounds, the following condition must remain satisfied: 0 ≤ (xB )i = bˆi − α aˆ i,t ≤ uˆ i , where uˆ i is the upper bound for the ith basic variable and aˆ i,t is the ith component of Aˆ t . If the entering variable is equal to zero (its lower bound), then α > 0. If aˆ i,t > 0, then (xB )i will decrease towards zero. Thus the ratio test   bˆi : aˆ i,t > 0 min 1≤i≤m aˆ i,t determines which (if any) is the first basic variable to go to zero. If on the other hand aˆ i,t < 0, then (xB )i will increase towards its upper bound. The corresponding ratio test   uˆ i − bˆi min : aˆ i,t < 0 1≤i≤m −aˆ i,t determines which (if any) is the first basic variable to reach its upper bound. Similar ratio tests can be derived in the case where xt = ut , its upper bound, and where α < 0. (See the Exercises.)

i

i i

i

i

i

i

218

book 2008/10/23 page 218 i

Chapter 7. Enhancements of the Simplex Method

The overall algorithm is summarized below. The method starts with a basis matrix B corresponding to a basic feasible solution

xB = bˆ = B −1 b − B −1 Aj xj . j ∈N

The steps of the algorithm are given below. Algorithm 7.1. Bounded-Variable Simplex Method 1. The Optimality Test—Compute the vector of simplex multipliers y T = cBT B −1 . Compute the reduced costs cˆj = cj −y TAj for the nonbasic variables xj . If for all nonbasic variables either (a) xj = 0 and cˆj ≥ 0, or (b) xj = uj and cˆj ≤ 0, then the current basis is optimal. Otherwise, select a variable xt that violates the optimality test as the entering variable. 2. The Step—Compute the entering column Aˆ t = B −1 At . Find an index s that corresponds to the minimum value θ of the following quantities (if any of the quantities is undefined, its value should be taken to be +∞): (i) the distance between the bounds for the entering variable xt : ut ; (ii) if xt = 0,  min

1≤i≤m

min

1≤i≤m



bˆi : aˆ i,t > 0 aˆ i,t

 ,

uˆ i − bˆi : aˆ i,t < 0 −aˆ i,t

 ,

where uˆ i is the upper bound for the ith basic variable; (iii) if xt = ut ,   bˆi min : aˆ i,t < 0 , 1≤i≤m −aˆ i,t   uˆ i − bˆi min : aˆ i,t > 0 . 1≤i≤m aˆ i,t Here bˆ is the vector of current values of the basic variables, uˆ i is the upper bound for the ith basic variable, and aˆ i,t is the ith component of Aˆ t . The ratio test determines the leaving variable. 3. The Update—Update the basis matrix B and the vector of basic variables xB . If xt is both the entering and leaving variable, then B does not change.

i

i i

i

i

i

i

7.2. Problems with Upper Bounds

book 2008/10/23 page 219 i

219

We now give formulas for step 3 of the above algorithm; the formulas use the result θ of the ratio test. Let α be the amount by which xt changes; α = θ if xt was zero, and α = −θ if xt was at its upper bound. Then in terms of the current basis, the variables can be updated using the formula       xB xB −Aˆ t ← +α . xN xN et Hence the basic variables can be updated via xB = bˆ − αAˆ t . The new value of the entering variable is xt + α. The objective value z will decrease by cˆt α. An example illustrating the method is given below. Example 7.2 (Upper Bounded Variables). Consider the linear program z = −4x1 + 5x2 3x1 − 2x2 + x3 = 6 −2x1 − 4x2 + x4 = 4 0 ≤ x1 ≤ 4 0 ≤ x2 ≤ 3 0 ≤ x3 ≤ 20 0 ≤ x4 ≤ 20.

minimize subject to

We use the initial basis xB = (x3 , x4 )T and xN = (x1 , x2 )T and set the nonbasic variables at the values x1 = 0 and x2 = 3. (The choice of basis does not uniquely determine the values of the basic variables.) Hence     0 −4 , cN = , cB = 0 5       3 −2 1 0 0 , and xN = , N= B= . −2 −4 0 1 3 The basic variables are computed from xB = B

−1

b−B

−1

 N xN =

12 16

 .

At the first iteration of the simplex method, the simplex multipliers are y T = cBT B −1 = ( 0

0)

and the coefficients for the optimality test are cˆ1 = −4

and cˆ2 = 5.

Both components fail the optimality test. We will use the larger violation to select x2 as the entering variable. The entering column is   −2 . Aˆ 2 = B −1 A2 = −4

i

i i

i

i

i

i

220

book 2008/10/23 page 220 i

Chapter 7. Enhancements of the Simplex Method

The entering variable will be decreased from its upper bound. In the ratio test the distance between the bounds for the entering variable is 3. Both components of the entering column are negative, so the rest of the ratio test is based on    bˆi 12 16 min : aˆ i,2 < 0 = min , = 4. 1≤i≤m 1≤i≤m −aˆ i,2 2 4 The result of the ratio test is that the entering variable moves to its lower bound. (The other possible ratio tests are irrelevant.) The basis does not change, so B and B −1 do not change. The change in the entering variable is α = −3, and the new basic feasible solution is         x3 x1 6 0 ˆ ˆ = = xB ← xB + α(−A2 ) = xB + 3A2 = and xN = . 4 0 x4 x2 This completes the first iteration. At the second iteration, the dual variables and the reduced costs are unchanged: y = (0, 0)T,

cˆ1 = −4,

and

cˆ2 = 5

because the basis has not changed. However, now the variable x2 is at its lower bound and cˆ2 satisfies the optimality test. The optimality test fails for cˆ1 , so x1 is the entering variable. The entering column is   3 . Aˆ 1 = −2 Variable x1 will be increased from zero. In the ratio test, the distance between bounds for x1 is 4. The ratio test for the first component is based on bˆ1 6 = = 2. aˆ 1,1 3 The ratio test for the second component is uˆ 2 − bˆ2 20 − 4 = 8. = −aˆ 2,1 2 (Note that uˆ 2 = u4 = 20.) The smallest of these values is 2, so x3 is the leaving variable. The change in the entering variable is α = 2. The new basis corresponds to xB = (x1 , x4 )T and xN = (x2 , x3 )T. In terms of this basis     −4 −5 , cN = , cB = 0 0       2 1 3 0 0 , and xN = , N= B= . 4 0 −2 1 0 The basic variables are

 xB =

x1 x4



 =

2 4 − 2(−2)

 =

  2 . 8

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 221 i

221

At the third iteration, the dual variables are  y=



− 43 0

and the coefficients in the optimality test are cˆ2 =

7 3

and

cˆ3 = 43 .

Since x2 and x3 are at their lower bounds, this basis is optimal. At the solution, x = ( 2 0 0 8 )T and z = cTx = −8 is the optimal objective value.

Exercises 2.1. Solve the following linear programs with the upper bound form of the simplex method. Use the explicit representation of the inverse of the basis matrix. Use the slack variables to form an initial basic feasible solution (note that there will be no upper bounds on the slack variables). (i) minimize subject to

z = −5x1 − 10x2 − 15x3 2x1 + 4x2 + 2x3 ≤ 50 3x1 + 5x2 + 4x3 ≤ 80 0 ≤ x1 , x2 , x3 ≤ 20.

minimize subject to

z = x1 − x2 − x 1 + x2 ≤ 5 x1 − 2x2 ≤ 9 0 ≤ x1 ≤ 6, 0 ≤ x2 ≤ 8.

(ii)

(iii) maximize

z = 6x1 − 3x2

subject to

2x1 + 5x2 ≤ 20 3x1 + 2x2 ≤ 40 0 ≤ x1 , x2 ≤ 15.

minimize subject to

z = −5x1 − 7x2 − 3x1 + 2x2 ≤ 30 − 2x1 + x2 ≤ 12 0 ≤ x1 , x2 ≤ 20.

(iv)

2.2. Repeat Exercise 2.1(i) using the initial values x1 = 20, x2 = 0, and x3 = 0. 2.3. Repeat Exercise 2.1(ii) using the initial values x1 = 0 and x2 = 5.

i

i i

i

i

i

i

222

book 2008/10/23 page 222 i

Chapter 7. Enhancements of the Simplex Method

2.4. Repeat Exercise 2.1(iv) using the initial values x1 = 20 and x2 = 0. 2.5. Consider the bounded-variable linear program z = x1 − 4x3 + x4 − 3x5 + 2x6 x1 + x2 − x3 − 2x5 = 0 x1 − 2x3 − x4 + x6 = 3 0 ≤ x1 , x2 , x3 ≤ 5 0 ≤ x4 , x5 , x6 ≤ 2.

minimize subject to

At a certain iteration of the bounded simplex algorithm, the basic variables are x1 and x2 , with basis inverse matrix   0 1 −1 . B = 1 −1 The nonbasic variables x3 and x4 are at their lower bound (zero), while x5 and x6 are at their upper bound. Now do the following: (i) Determine the corresponding basic solution. (ii) Determine which of the nonbasic variables will yield an improvement in the objective value if chosen to enter the basis. (iii) For each of the candidate variables that you found in part (ii), determine the corresponding leaving variable and the resulting basic solution. 2.6. Derive the remaining portions of the ratio test for the case where the entering variable xt is at its upper bound. 2.7. Derive a simplex method for linear programming problems with general bounds on the variables  ≤ x ≤ u. 2.8. Determine how the simplex method for problems with upper bounds would be modified if some of the variables had upper and lower bounds both equal to 0. 2.9. A basic feasible solution to the bounded-variable problem is said to be degenerate if one of the basic variables is equal to its upper or lower bound. Prove that, in the absence of degeneracy, the bounded-variable simplex method will terminate in a finite number of iterations. 2.10. Consider the bounded-variable problem minimize

z = cTx

subject to

Ax = b 0 ≤ x ≤ u.

What is the dual to this problem? What are the complementary slackness conditions at the optimum?

7.3

Column Generation

One of the important properties of the simplex method is that it does not require that the constraint matrix A be explicitly available. Indeed, if we review the steps of the simplex method, we see that the columns of A are used only to determine whether the reduced costs

i

i i

i

i

i

i

7.3. Column Generation

book 2008/10/23 page 223 i

223

cˆj = cj − y TAj are nonnegative for every j , and if not, to generate a column At that violates this condition. (At is then used to obtain the entering column Aˆ t = B −1 At .) All that is needed is some technique that determines whether a basic solution is optimal, and if not, produces a column that violates the optimality conditions. When the constraint matrix A has some specific known structure, it is sometimes possible to find such an At without explicit knowledge of the columns of A. This technique, which generates columns of A only as needed, is called column generation. One application where column generation is possible is the cutting stock problem, discussed below. Practical cutting stock problems may involve many millions of variables—so many that it is impossible even to form their columns in reasonable time. Yet by using column generation, the simplex algorithm can be used to solve such problems. At each iteration of the algorithm, an auxiliary problem determines the column of A that yields the largest coefficient cˆj . Remarkably, this auxiliary problem can be solved without generating the columns of A. To present the cutting stock problem, we start with an example. A manufacturer produces sheets of material (such as steel, paper, or foil) of standard width of 50 . To satisfy customer demand, the sheets must be cut into sections of the same length but of smaller widths. Suppose the manufacturer has orders for 25 rolls of width 20 , 120 rolls of width 14 , and 20 rolls of width 8 . To fill these orders, the manufacturer can cut the standard sheets in a variety of ways. For instance, a standard sheet could be cut into two sections of width 20 and one section of width 8 , with a waste of 2 ; or it could be cut into two sections of width 14 and two sections of width 8 , with a waste of 6 (see Figure 7.1). Each such alternative is called a pattern, and clearly there are many possible patterns. The problem is to determine how many sheets need to be cut and into which patterns. Assuming that waste material is thrown away, our objective is to minimize the total number of sheets that need to be cut. In the general case, a manufacturer produces sheets of standard width W . These sheets must then be cut to smaller widths to meet customer demand. Specifically, the manufacturer has to supply bi sections of width wi < W , for i = 1, . . . , m. To formulate this problem, we represent each cutting pattern by a vector of length m, whose ith component indicates the number of sections of width wi that are used in that pattern. For example, the two patterns described above are represented by     2 0 and 0 2 . 1 2

20"

20"

14"

8"

14"

waste

50"

8"

8" waste

50"

Figure 7.1. Cutting patterns.

i

i i

i

i

i

i

224

book 2008/10/23 page 224 i

Chapter 7. Enhancements of the Simplex Method

The first component in each vector indicates the number of sections of width 20 used in a pattern, the second component indicates the number of sections of width 14 , and the third component indicates the number of sections of width 8 . A vector a = (a1 , . . . , am )T represents a cutting pattern if and only if w1 a1 + w2 a2 + · · · + wm am ≤ W, where { ai } are nonnegative integers. Let xi denote the number of sheets to be cut into pattern i, and let n denote the number of all possible cutting patterns. Even for small values of m, this number may be enormous. In practical problems, m may be of the order of a few hundred. In such cases, n may be of the order of hundreds of millions. Due to its sheer size, the matrix defined by the various patterns will not be available explicitly. We denote this conceptual matrix by A. The problem of minimizing the number of sheets used to satisfy the demands becomes minimize

z=

n

xi

i=1

subject to

Ax ≥ b x ≥ 0.

The variables xi must also be integer. Here we shall solve the linear program, ignoring the integrality restrictions, and then round the solution variables appropriately. Although rounding the solution of a linear program does not necessarily give an optimal solution of the associated program with integrality constraints, in the case of cutting stock problems, rounding is often appropriate because it is applied in large-scale production settings. Finding an initial basic feasible solution is not difficult. For example, in the problem above we can use the initial basis matrix   2 0 0 B= 0 3 0 . 0 0 6 The columns of B corresponds to the patterns that cut as many 20 , 14 , and 8 sections as possible. For convenience we denote these columns by A1 , A2 , and A3 and denote the number of sheets cut according to each of these patterns by x1 , x2 , and x3 . The solution corresponding to this basis matrix is  xB =

x1 x2 x3



⎛1 2

= B −1 b = ⎝ 0 0

0 1 3

0

⎞ ⎛ 25 ⎞ 0  25  2 0 ⎠ 120 = ⎝ 40 ⎠ . 1 10 20 6 3

Suppose now that at some iteration we have a basic feasible solution with corresponding basis matrix B. To determine whether the solution is optimal we first compute the vector of simplex multipliers y T = cBT B −1 . Next we must determine whether the solution is optimal. Suppose first that some component of y, say yi , is negative. Then the reduced cost of the ith excess variable (xn+i ) is cˆn+i = 0

i

i i

i

i

i

i

7.3. Column Generation

book 2008/10/23 page 225 i

225

− y T(−ei ) = yi < 0 (here ei denotes a vector of length m with a 1 in its ith position, and zeroes elsewhere). We can therefore choose this excess variable to be the variable that enters the basis. No further computation of the coefficients cˆj will be needed. Suppose now that y ≥ 0. Then the excess variables will all have nonnegative reduced costs. We must now determine whether the variables in the original problem satisfy the optimality conditions, that is, whether cˆj = 1 − y TAj ≥ 0,

j = 1, . . . , n.

Because A has so many columns, and because these columns are not explicitly available, it is virtually impossible to perform this computation variable by variable. Fortunately, we know the structure of these columns. We will now show how we can use this knowledge either to verify optimality or to select an entering variable. The idea is simple but clever. To determine whether the optimality conditions are satisfied, we will find a column At = (a1 , a2 , . . . , am )T that corresponds to the most negative reduced cost cˆt . This in turn is the column t with the largest value of y TAj . Since each column corresponds to some cutting pattern, At will be the solution to the problem maximize

z¯ = y1 a1 + y2 a2 + · · · + ym am

subject to

w 1 a1 + w 2 a2 + · · · + w m am ≤ W ai ≥ 0 and integer, i = 1, . . . , m.

This problem has a linear objective and a single linear constraint; all variables are required to be nonnegative integers. A problem of this form is called a knapsack problem. It can be solved efficiently by special-purpose algorithms. Since finding the variable xt with the most negative reduced cost cˆt can be formulated as a knapsack problem, it can be accomplished without explicit knowledge of each column of A. The solution of the knapsack problem is a pattern At corresponding to the largest value of y TAj . If y TAt > 1, this column violates the optimality condition and is selected to enter the basis. If y TAt ≤ 1, the current basic feasible solution is optimal, and the algorithm is terminated. Example 7.3 (Cutting Stock Problem). Consider the example discussed in this section. Suppose that the initial basis matrix is given as above. The vector y is given by ⎞ ⎛1 0 0 2 y T = cBT B −1 = ( 1 1 1 ) ⎝ 0 13 0 ⎠ = ( 12 13 16 ) . 0 0 16 To find the column with the most negative reduced cost cˆj , we solve the problem + 13 a2 + 16 a3

maximize

1 a 2 1

subject to

20a1 + 14a2 + 8a3 ≤ 50 a1 , a2 , a3 ≥ 0 and integer,

using a special-purpose algorithm for solving knapsack problems. The solution is a = (0, 3, 1)T, with a knapsack objective value of y Ta = 7/6. For convenience we label a by

i

i i

i

i

i

i

226

book 2008/10/23 page 226 i

Chapter 7. Enhancements of the Simplex Method

A4 , and label the corresponding variable (representing the number of sheets to be cut in pattern A4 ) by x4 . Then cˆ4 is the most negative of the coefficients cˆj . Since cˆ4 = 1 − 7/6 = −1/6 < 0, the current solution is not optimal, and x4 enters the basis. To determine which variable leaves the basis we compute ⎞ ⎛1 0 0 0 0 2 Aˆ 4 = B −1 A4 = ⎝ 0 13 0 ⎠ 3 = 1 . 1 1 0 0 16 6 , 40, 10 )T. The admissible ratios in the ratio test are the second ratio Recall that xB = ( 25 4 3 40/1 = 40, and the third ratio (10/3)/(1/6) = 20. The latter is smaller, so the third basic variable leaves the basis. The new basis matrix and its inverse are ⎛1 0   0⎞ 2 2 0 0 B= 0 3 3 and B −1 = ⎝ 0 13 −1 ⎠ , 0 0 1 0 0 1 and the vector of basic variables is  xB =

x1 x2 x4

0 ⎞  25  ⎛ 25 ⎞ 2 −1 ⎠ 120 = ⎝ 20 ⎠ . 20 20 1

⎛1

0

= B −1 b = ⎝ 0

1 3

0

0

1

1 ) B −1 = ( 12



2

The vector of simplex multipliers is y T = cBT B −1 = ( 1

1 3

0),

and the new knapsack problem is + 13 a2

maximize

1 a 2 1

subject to

20a1 + 14a2 + 8a3 ≤ 50 a1 , a2 , a3 ≥ 0 and integer.

The solution to the knapsack problem is the pattern a = (1, 2, 0)T with knapsack objective value y Ta = 76 . We label a by A5 and the corresponding variable by x5 . Then cˆ5 = 1 − y TA5 = 1 − 7/6 = −1/6 < 0, and hence the current solution is still not optimal, and x5 enters the basis. We compute ⎛1 0 0⎞1 ⎛ 1 ⎞ 2 2 Aˆ 5 = B −1 A5 = ⎝ 0 13 −1 ⎠ 2 = ⎝ 2 ⎠ . 3 0 0 0 0 1 )/( 12 ) and (20)/( 23 ). The first of these ratios is smaller, The ratio test compares the ratios ( 25 2 and the leaving variable is x1 . The new basis matrix and its inverse are ⎞ ⎛   1 0 0 1 0 0 −1 B= 2 3 3 and B = ⎝ − 23 13 −1 ⎠ , 0 0 1 0 0 1

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 227 i

227

and the vector of basic variables is



xB =

x5 x2 x4



 =B

−1

b=

25



10 3

.

20

The vector of simplex multipliers is y T = cBT B −1 = ( 1

1

1 ) B −1 = ( 13

1 3

0).

To find the column with the largest coefficient cˆj we solve the knapsack problem maximize subject to

1 a 3 1

+ 13 a2

20a1 + 14a2 + 8a3 ≤ 50 a1 , a2 , a3 ≥ 0 and integer.

The solution to this problem is a = (0, 3, 0)T, which is the column of the basic variable x2 . T The knapsack objective value is y a = 1, indicating (as expected) that the reduced cost of x2 is zero. Since cˆ2 = min cˆj = 0, the current solution is optimal. Our basic variables are x5 = 25, x2 = 3.33, and x4 = 20. In practice we are interested in an integer solution. For this problem, rounding upwards in fact gives the optimal integer solution. The solution is to cut 25 sections according to the pattern (1, 2, 0)T, 4 sections according to the pattern (0, 3, 0)T, and 20 sections according to the pattern (0, 3, 1)T, using a total of 49 standard sheets.

Exercises 3.1. Find all feasible patterns in the example discussed in this section. 3.2. Consider the cutting stock problem that arises when a company manufactures sheets of standard width 100 and has commitments to supply 40 sections of width 40 , 60 sections of width 24 , and 80 sections of width 18 . Find an initial basic feasible solution to this problem, and formulate the knapsack problem that will determine whether this solution is optimal.

7.4 The Decomposition Principle In some applications of linear programming the constraints of the problem are divided into two groups, one group of “easy” constraints and another of “hard” constraints. This can happen in network problems where the constraints that describe the network (the easy constraints) are augmented by additional constraints of a more general form (the hard constraints). This can also happen in “block angular” problems (see below) where there are a small number of constraints that involve all the variables (the hard constraints), but if these are removed the problem decomposes into several independent smaller problems, each of which is easier to solve. (On a parallel computer these smaller problems could be solved simultaneously on separate processors.)

i

i i

i

i

i

i

228

book 2008/10/23 page 228 i

Chapter 7. Enhancements of the Simplex Method

Referring to the constraints as “easy” and “hard” may be a bit deceptive. The “hard” constraints need not be in themselves intrinsically difficult, but rather they can complicate the linear program, making the overall problem more difficult to solve. If these “complicating” constraints could be removed from the problem, then more efficient techniques could be applied to solve the resulting linear program. The decomposition principle is a tool for solving linear programs having this structure. It is another example of column generation. The decomposition principle uses a change of variables to transform the original linear program into a new linear program that involves only the hard constraints. If the number of hard constraints is small, then it is likely that this new linear program can be solved by the simplex method in few iterations. However, the optimality test for the new linear program will require solving an auxiliary linear program involving the easy constraints, and so will be expensive. The cost of performing the optimality test will determine whether using the decomposition principle is more effective than applying the simplex method directly to the original problem. Consider a linear program of the form minimize subject to

z = cTx AH x = bH AE x = bE x ≥ 0,

where AH is the constraint matrix for the hard constraints and AE is the matrix for the easy constraints. We will assume that the set { x : AE x = bE , x ≥ 0 } is bounded. (The unbounded case will be discussed later in this section.) Then every feasible point x for the easy constraints can be represented as a convex combination of the extreme points { vi } of this set: x=

k

α i vi ,

i=1

where k

αi = 1

and

αi ≥ 0,

i = 1, . . . , k

i=1

(see Theorem 4.6 of Chapter 4). If the matrix AE really does represent easy constraints, then in principle it should not be difficult to generate the associated extreme points (basic feasible solutions). The decomposition principle only generates individual extreme points as needed and does not normally generate the entire set of extreme points. This representation in terms of extreme points can be used to rewrite the linear

i

i i

i

i

i

i

7.4. The Decomposition Principle

book 2008/10/23 page 229 i

229 

program: z=c

minimize



T

AH

α i vi

i

 subject to







αi v i

= bH

i

αi = 1

i

α ≥ 0. If we define cM = ( cTv1 · · · cTvk )T   AH v1 · · · AH vk AM = 1 ··· 1   bH bM = , 1 then the linear program becomes minimize

z = cMT α

subject to

AM α = bM α ≥ 0.

α

This is the linear program that we will solve using the simplex method, with the coefficients α as the variables. It is sometimes referred to as the master problem to distinguish it from the auxiliary linear program that will be solved as part of the optimality test in the simplex method. Its coefficients are denoted with a subscript M because of this name. Example 7.4 (Transformation of a Linear Program). Consider the linear program minimize subject to

z = 3x1 − 5x2 − 7x3 + 2x4 x1 + 2x2 − x3 + 2x4 = 2.75 3x1 − x2 + 4x3 − 5x4 = 14.375 2x1 + 3x2 ≤ 9 x1 + 2x2 ≤ 5 3x3 + 5x4 ≤ 15 x3 − x4 ≤ 3 x ≥ 0.

We will consider the first two constraints to be the hard constraints and the last four to be the easy constraints. If the hard constraints are removed, then the problem can be divided into two independent linear programs—one involving the variables x1 and x2 , the other involving x3 and x4 : minimize 3x1 − 5x2 subject to 2x1 + 3x2 ≤ 9 x1 + 2x2 ≤ 5 x1 , x2 ≥ 0

i

i i

i

i

i

i

230

book 2008/10/23 page 230 i

Chapter 7. Enhancements of the Simplex Method

and minimize subject to

−7x3 + 2x4 3x3 + 5x4 ≤ 15 x3 − x4 ≤ 3 x3 , x4 ≥ 0.

These linear programs involve only two variables and can be solved graphically. If slack variables x5 , x6 , x7 , and x8 are added to the easy constraints to convert them into equations, then c = ( 3 −5 −7 2 0 0 0 0 )T ,     1 2 −1 2 0 0 0 0 2.750 , bH = , AH = 3 −1 4 −5 0 0 0 0 14.375 ⎛ ⎛ ⎞ ⎞ 2 3 0 0 1 0 0 0 9 2 0 0 0 1 0 0⎟ ⎜1 ⎜ 5⎟ AE = ⎝ ⎠ , bE = ⎝ ⎠ . 0 0 3 5 0 0 1 0 15 0 0 1 −1 0 0 0 1 3 The extreme points for the first linear program (with the slack variables included) are ⎞ ⎛ ⎞ 3 x1 ⎜ x2 ⎟ ⎜ 1 ⎟ ⎝ ⎠ = ⎝ ⎠, x5 0 x6 0 ⎛



⎞ 4.5 ⎜ 0 ⎟ ⎝ ⎠, 0 0.5



⎞ 0 ⎜ 2.5 ⎟ ⎝ ⎠, 1.5 0

⎛ ⎞ 0 ⎜0⎟ ⎝ ⎠. 9 5

and

The extreme points for the second linear program are ⎞ ⎛ ⎞ 3.75 x3 ⎜ x4 ⎟ ⎜ 0.75 ⎟ ⎠, ⎝ ⎠=⎝ x7 0 x8 0 ⎛

⎛ ⎞ 3 ⎜0⎟ ⎝ ⎠, 6 0

⎛ ⎞ 0 ⎜3⎟ ⎝ ⎠, 0 6

⎛ and

⎞ 0 ⎜ 0 ⎟ ⎝ ⎠. 15 3

The extreme points for the set of easy constraints { x : AE x = bE , x ≥ 0 } are obtained by combining extreme points from the two smaller linear programs. The resulting matrix of extreme points V = ( v1 · · · vk ) is ⎛

3 ⎜ 1 ⎜ ⎜ 3.75 ⎜ ⎜ 0.75 V =⎜ ⎜ 0 ⎜ ⎜ 0 ⎝ 0 0

3 1 3 0 0 0 6 0

3 3 1 1 0 0 3 0 0 0 0 0 0 15 6 3

4.5 4.5 4.5 4.5 0 0 0 0 0 0 0 2.5 2.5 2.5 3.75 3 0 0 3.75 3 0 0.75 0 3 0 0.75 0 3 0 0 0 0 1.5 1.5 1.5 0.5 0.5 0.5 0.5 0 0 0 0 6 0 15 0 6 0 0 0 6 3 0 0 6

⎞ 0 0 0 0 0 2.5 0 0 0 0 ⎟ ⎟ 0 3.75 3 0 0 ⎟ ⎟ 0 0.75 0 3 0 ⎟ ⎟. 1.5 9 9 9 9 ⎟ ⎟ 0 5 5 5 5 ⎟ ⎠ 15 0 6 0 15 3 0 0 6 3

i

i i

i

i

i

i

7.4. The Decomposition Principle

book 2008/10/23 page 231 i

231

The master linear program has constraint matrix AM , whose first two rows are equal to AH V , and whose last row is (1, . . . , 1):  2.75 2 11 5 2.25 1.5 10.5 4.5 AM = 19.25 20 −7 8 24.75 25.5 −1.5 13.5 1 1 1 1 1 1 1 1  2.75 2 11 5 −2.25 −3 6 0 8.75 9.5 −17.5 −2.5 11.25 12 −15 0 . 1 1 1 1 1 1 1 1 The objective coefficients in the master problem are  cM = V Tc = −20.75 −17 10 4 −11.25 −37.25

−33.5

−6.5

−7.5

−12.5

19.5

−24.75

13.5 −21

6

T 0 .

The right-hand side for the master problem is   2.75 bM = 14.375 . 1 It is neither necessary nor desirable to write down the master linear program explicitly. The number of extreme points can be immense—much larger than the number of variables in the original problem. Fortunately, it is possible to apply the simplex method to the master problem without explicitly generating all the columns of AM . To describe the method we assume that an initial basic feasible solution has been specified. (Initialization procedures are discussed below.) If there are mhard constraints in AH , the basis will be of size m + 1 because of the additional constraint αi = 1. Let B be the basis matrix (B is a submatrix of AM ). As usual, the dual variables are computed via y T = (cM )TB B −1 , where (cM )B is the subvector of cM corresponding to the current basis. The optimality test is carried out by computing the components of cMT − y TAM corresponding to the nonbasic variables. If any of these entries is negative, then the current basis is not optimal, and the most negative of these entries can be used to select the entering variable. Hence the optimality test can be carried out by determining min (cMT)i − (y TAM )i i

and checking to see if the optimal value is negative. All values of i can be considered, since this expression will be zero if αi is a basic variable. This minimization problem is equivalent to min cTvi − y¯ TAH vi − ym+1 · 1, i

i

i i

i

i

i

i

232

book 2008/10/23 page 232 i

Chapter 7. Enhancements of the Simplex Method

where y¯ = (y1 , . . . , ym )T. Since { vi } is the set of extreme points, and since any bounded linear program always has an optimal extreme point (see Section 4.4), the optimality test can be written as minimize z = (c − ATHy) ¯ Tx − ym+1 x

subject to

AE x = bE x ≥ 0.

This is a linear program involving only the easy constraints, so presumably it is easy to solve. (The term ym+1 in the objective is a constant. It can be ignored when solving this linear program for x but must be included when determining the optimal value of z.) If the solution to this linear program has optimal objective value zero, then the current basis for the master problem is optimal. If the optimal objective value is negative, then the current basis is not optimal. Note that the optimal basic feasible solution (the optimal basic feasible solution for the easy problem in the optimality test) is one of the extreme points in { vi }. Denote it by v. The rest of the simplex method for solving the master problem is much as before. The entering column is computed using the formula   AH v −1 ˆ . (AM )t = B 1 A ratio test is performed to determine the leaving variable, and then B −1 and αB are updated. (Recall that α is the vector of variables in the master problem.) We now summarize the steps in an iteration of the method. A representation of B −1 must be provided, where the basis matrix B consists of the basic columns of the matrix AM . The corresponding basic feasible solution to the master problem is αB = B −1 bM . The vector (cM )B contains the basic components of the vector cM . Note that AM and cM are not normally available explicitly; only B and (cM )B may be available. 1. The Optimality Test—Compute the dual variables y T = (cM )TB B −1 and set y¯ = (y1 , . . . , ym )T. Solve the linear program minimize

z = (c − ATHy) ¯ Tx − ym+1

subject to

AE x = bE x≥0

x

for an optimal extreme point v. If the optimal value is zero, then the current basis is optimal. Otherwise, use v to define the entering column. 2. The Step—Compute the entering column   AH v . (Aˆ M )t = B −1 1 Find an index s that satisfies (bˆM )s = min 1≤i≤m+1 (Aˆ M )s,t



(bˆM )i : (Aˆ M )i,t > 0 (Aˆ M )i,t

 .

i

i i

i

i

i

i

7.4. The Decomposition Principle

book 2008/10/23 page 233 i

233

(Here (Aˆ M )i,t denotes the ith component of (Aˆ M )t .) The ratio test determines the leaving variable and the pivot entry (Aˆ M )s,t . If (Aˆ M )i,t ≤ 0 for all i, then the problem is unbounded. 3. The Update—Update the inverse matrix B −1 and the vector of basic variables αB (for example, by performing elimination operations that transform (Aˆ M )t into the sth column of the identity matrix). Once an optimal solution to the master problem has been found, the solution to the original problem is obtained from x = VB αB , where VB is the matrix whose columns are the vertices corresponding to the optimal basis for the master problem. We now illustrate the decomposition principle with an example. The set of extreme points for this example was given in Example 7.4, but it is not used here, and would not normally be available. Only information associated with the current basis is used in the calculations. We assume that an initial basic feasible solution for the master problem is available; initialization procedures are discussed later in this section. Example 7.5 (Decomposition Principle). Consider the linear program from Example 7.4. As before, we will consider the first two constraints to be the hard constraints and the last four to be the easy constraints. An initial feasible point for the master problem can be obtained using the extreme points ⎛ ⎞ 3 ⎜1⎟ ⎜ ⎟ ⎜3⎟ ⎜ ⎟ ⎜0⎟ v1 = ⎜ ⎟ , ⎜0⎟ ⎜ ⎟ ⎜0⎟ ⎝ ⎠ 6 0



⎞ 0 ⎜ 2.5 ⎟ ⎜ ⎟ ⎜ 3 ⎟ ⎜ ⎟ ⎜ 0 ⎟ v2 = ⎜ ⎟, ⎜ 1.5 ⎟ ⎜ ⎟ ⎜ 0 ⎟ ⎝ ⎠ 6 0



and

⎞ 0 ⎜ 2.5 ⎟ ⎜ ⎟ ⎜ 0 ⎟ ⎜ ⎟ ⎜ 3 ⎟ v3 = ⎜ ⎟. ⎜ 1.5 ⎟ ⎜ ⎟ ⎜ 0 ⎟ ⎝ ⎠ 0 6

For convenience, we have labeled the extreme points as v1 , v2 , and v3 ; this merely reflects the fact that they are the initial extreme points and does not correspond to their location in the matrix V in Example 7.4. For this initial basis, (cM )B = ( cTv1 cTv2 cTv3 )T = ( −17 −33.5 −6.5 )T    2 2  11 AH v1 AH v2 AH v3 = 20 9.5 −17.5 B= 1 1 1 1 1 1 −1 ˆ αB = bM = B bM = ( 0.6786 0.2381 0.0833 )T z = −20.0536. The dual variables are y T = (cM )TB B −1 = ( 7.7143

1.5714

−63.8571 ) ,

i

i i

i

i

i

i

234

book 2008/10/23 page 234 i

Chapter 7. Enhancements of the Simplex Method

so y¯ = ( 7.7143 1.5714 )T. The coefficients of the objective in the linear program for the optimality test are c − ATHy¯ = ( −9.4286

−18.8571

−5.5714

−5.5714

0

0

0

0 )T .

Recall from Example 7.4 that, because of the special structure of the easy constraint matrix AE , this linear program splits into two smaller linear programs:

and

minimize

−9.4286x1 − 18.8571x2

subject to

2x1 + 3x2 ≤ 9 x1 + 2x2 ≤ 5 x1 , x2 ≥ 0

minimize

−5.5714x3 − 5.5714x4

subject to

3x3 + 5x4 ≤ 15 x3 − x4 ≤ 3 x3 , x4 ≥ 0.

These small linear programs can be solved graphically. The first linear program has two optimal basic feasible solutions (here the optimal slack variables are also listed): ( x1

x2

x 6 )T = ( 3

x5

1

0

0 )T

and

(0

2.5

1.5

0 )T

with optimal objective value −47.1429. The second linear program has the solution ( x3

x4

x7

x8 )T = ( 3.75

0.75

0 )T

0

with objective value −25.0714. The objective value for the linear program in the optimality test is obtained by subtracting y3 from these two objective values: −47.1429 − 25.0714 − y3 = −47.1429 − 25.0714 − (−63.8571) = −8.3571 < 0, so the current basis is not optimal. If the first solution to the first linear program is used, then v4 = ( 3 1 3.75 0.75 0 0 0 0 )T is the entering vertex. The entering column is given by (Aˆ M )t = B −1



AH v4 1



 =

1.1429 −0.2262 0.0833

 .

With the right-hand side bˆM = ( 0.6786

0.2381 0.0833 )T, the ratios in the ratio test are   0.5938 , − 1

i

i i

i

i

i

i

7.4. The Decomposition Principle

book 2008/10/23 page 235 i

235

so that α1 is the leaving variable. The new basis consists of { α4 , α2 , α3 }. At the second iteration, (cM )B = ( −20.75 −33.5 −6.5 )T   2.75 2 11 B = 19.25 9.5 −17.5 1 1 1 αB = ( 0.5938 0.3724 0.0339 )T z = −25.0156. The dual variables are y T = (cM )TB B −1 = ( 5.625

0.875

−53.0625 ) .

The objective coefficients for the linear program in the optimality test are c − ATHy¯ = ( −5.25

−15.375

−4.875

−4.875

0

0

0

0 )T .

The resulting two small linear programs are solved graphically. The first has the solution (0

2.5

0 )T

1.5

with optimal objective value −38.4275. The second has the solution ( 3.75

0.75

0 )T

0

with objective value −21.9375. For the optimality test the objective value is −38.4275 − 21.9375 − (−53.0625) = −7.3125 < 0, so the current basis is not optimal, and v5 = ( 0

2.5

3.75

0.75

1.5

0

0 )T

0

is the entering vertex. The entering column is (Aˆ M )t = B and the ratios in the ratio test are

−1





AH v5 1





4.7500 0.4643 0.4643

=

0.1250 0.8021 0.0729

 ,

 .

There is a tie; we will (arbitrarily) choose α2 as the leaving variable. The new basis consists of { α4 , α5 , α3 }.

i

i i

i

i

i

i

236

book 2008/10/23 page 236 i

Chapter 7. Enhancements of the Simplex Method At the third iteration, (cM )B = ( −20.75 −37.25 −6.5 )T   2.75 2.75 11 B = 19.25 8.75 −17.5 1 1 1 αB = ( 0.5357 0.4643 0 )T z = −28.4107.

The dual variables are y T = (cM )TB B −1 = ( 8.7273

−75 ) .

1.5714

The objective coefficients for the linear program in the optimality test are c − ATHy¯ = ( −10.4416

−20.8831

−4.5584

−7.5974

0

0

0

0 )T .

The resulting two small linear programs are solved graphically. The first has two solutions: (3

1

0 )T

0

and

(0

2.5

0 )T

1.5

with optimal objective value −52.2078. The second also has two solutions: ( 3.75

0.75

0

0 )T

and

(0

3

0

6 )T

with objective value −22.7922. For the optimality test the objective value is −52.2078 − 22.7922 − (−75) = 0, so the current basis for the master problem is optimal. The optimal objective value for the original linear program is z = −28.4107, the same as for the master linear program. The optimal values of the original variables are x = α4 v4 + α5 v5 + α3 v3 = ( 1.6071

1.6964

3.75

0.75

0.6964

0

0

0 )T .

It is straightforward to check that this point is feasible for the original problem, and that it gives the correct objective value. Some procedure is needed to find an initial basic feasible solution for the simplex method. In some cases, an initial basis is readily available. For example, suppose that the original linear program is of the form minimize

z = cTx

subject to

AH x ≤ bH AE x ≤ bE x≥0

with bH ≥ 0 and bE ≥ 0. Then v0 = (0, . . . , 0)T is an extreme point for the set { x : AE x ≤ bE , x ≥ 0 }. Let V be the matrix whose columns are the extreme points of

i

i i

i

i

i

i

7.4. The Decomposition Principle

book 2008/10/23 page 237 i

237

this set, with v0 as its first column. Then the master problem will have the form minimize

z = cMTα

subject to

(AH V )α + s = bH eTα = 1 α ≥ 0,

α

where s is a vector of slack variables and e = (1, . . . , 1)T. The constraint matrix for the master problem will be   AH V I . AM = eT 0 An initial basis can be obtained using the slack variables s (the final columns of AM ) together with the variable corresponding to the extreme point v0 = (0, . . . , 0)T (the initial column of AM ). Since AH v0 = (0, . . . , 0)T, the basis matrix will be B = I . This idea can also be used for problems of the form minimize subject to

z = cTx AH x ≤ bH AE x = bE x≥0

if we know an extreme point v0 for the easy constraints (see the Exercises). In cases where there is no obvious initial basis for the master problem, artificial variables must be added. Then either a two-phase or big-M approach can be used to initialize the method. For example, if a two-phase approach is used and bM ≥ 0, then the phase-1 problem would be minimize z = eTa α,a

A M α + a = bM α, a ≥ 0,

subject to

where a is a vector of artificial variables and e = (1, . . . , 1)T. The initial basis consists entirely of the artificial variables and B = I . Then the algorithm for the decomposition principle is used to solve this linear program to obtain an initial basic feasible solution for the original problem. Up to this point we have assumed that the set { x : AE x = bE , x ≥ 0 } is bounded. This is not necessary. In general every feasible point x can be represented in terms of extreme points { vi } and directions of unboundedness dj : x=

k

α i vi +

i=1



βj dj ,

j =1

where k

i=1

αi = 1 αi ≥ 0, βj ≥ 0,

i = 1, . . . , k j = 1, . . . , .

i

i i

i

i

i

i

238

book 2008/10/23 page 238 i

Chapter 7. Enhancements of the Simplex Method

(See Theorem 4.6 of Chapter 4.) This representation can then be used to derive a similar simplex method for the decomposed problem. For further details, see the book by Chvátal (1983). One of the most important applications of the decomposition principle is to block angular problems. These are problems where AE , the matrix for the easy constraints, is block diagonal. That is, ⎛ (A ) E (1) ⎜ AE = ⎜ ⎝

0

⎟ ⎟, ⎠

(AE )(2) ..

0



. (AE )(r)

where each (AE )(j ) is itself a matrix. In this case the linear program for the optimality test maximize

z = (ATHy¯ − c)Tx + ym+1

subject to

AE x = bE x≥0

x

splits into r disjoint linear programs of smaller size: maximize

z(j ) = (ATHy¯ − c)T(j ) x(j )

subject to

(AE )(j ) x(j ) = (bE )(j ) x(j ) ≥ 0.

x(j )

(The subscript (j ) indicates the components of a vector corresponding to the submatrix (AE )(j ) .) On a parallel computer, it would be possible to solve these smaller problems simultaneously on a set of processors. The linear program in Example 7.4 is of this type, with  (AE )(1) =  (AE )(2) =

2 1 3 1

3 2



  9 , = 5

, (bE )(1)    5 15 , and (bE )(2) = . −1 3

Problems with this structure arise when modeling an organization consisting of many separate divisions. Each of the blocks in the easy constraints corresponds to the portion of the model for a particular division. The hard constraints correspond to the linkages connecting one division with another, and with the allocation of activities and resources among the divisions. The overall objective is to optimize some “benefit” for the entire organization.

Exercises 4.1. Set up and solve the phase-1 problem for the master problem in Example 7.4.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 239 i

239

4.2. Consider a linear program of the form minimize subject to

z = cTx AH x ≤ bH AE x = bE x ≥ 0,

where AH represents the hard constraints and AE represents the easy constraints. Assume that an extreme point v0 for the easy constraint set { x : AE x = bE , x ≥ 0 } is known. Show how to find an initial basic feasible solution for the decomposition principle. What is the basis matrix B? Show how to compute B −1 efficiently. 4.3. Solve the following linear program using the decomposition principle: minimize subject to

z = −2x1 − 5x2 x1 + 2x2 = 13.5 x1 + 3x2 = 18.0 x1 ≤ 9 x2 ≤ 5 x1 , x2 ≥ 0.

Let the first two constraints be the “hard” constraints and the remaining constraints be the “easy” constraints. As an initial basis use the extreme points (0, 0)T, (0, 5)T, and (9, 5)T. (These are extreme points for the easy constraints in their original form, without slack variables.) 4.4. Use the decomposition principle to solve the problem minimize subject to

z = −x1 − 2x2 − 4y1 − 3y2 x1 + x2 + 2y1 ≤ 4 x2 + y1 + y2 ≤ 3 2x1 + x2 ≤ 4 x1 + x2 ≤ 2 y1 + y2 ≤ 2 3y1 + 2y2 ≤ 5 x ≥ 0, y ≥ 0.

4.5. At each iteration of the decomposition principle the current objective value provides an upper bound on the optimal objective value. It is also possible to determine a lower bound on the objective. Let x be a feasible point for the original linear program, and let y be the vector of dual variables at the current iteration of the decomposition principle. Prove that (c − ATHy) ¯ Tx − ym+1 ≥ z¯ ∗ , where z¯ ∗ is the optimal value of the linear program in the optimality test. Use this formula to prove that z∗ ≥ y¯ TbH + ym+1 + z¯ ∗ , where z∗ is the optimal objective value for the original linear program.

i

i i

i

i

i

i

240

book 2008/10/23 page 240 i

Chapter 7. Enhancements of the Simplex Method

4.6. Use the formula from the previous problem to compute lower bounds on the objective at each iteration for the linear program in Example 7.4.

7.5

Representation of the Basis

In previous chapters we described the formulas that govern the simplex method. We have seen that all of the information needed for an iteration can be obtained from the set of variables that are basic and from the corresponding basic matrix B. Thus the vectors xb , y, and Aˆ s can be computed directly from the formulas xb = B −1 b,

Aˆ s = B −1 As .

y T = cBT B −1 ,

In this section we discuss approaches for efficient implementation of these formulas. In Section 7.5.1 we describe the approach known as the “product form of the inverse” in which the basis inverse B −1 is represented as a product of elementary matrices. These elementary matrices are quite sparse, so matrix-vector multiplications with respect to the basis matrix inverse can be performed at relatively low cost. This method, however, has been superseded by a more efficient approach that represents the LU factorization of the basis B as a product of elementary matrices; this approach is described in Section 7.5.2. Using this approach the vectors xb , y, and Aˆ s are obtained by solving a system of equations with respect to B: Bxb = b, y TB = cBT , BAˆ s = As . The LU factorization is superior to the product form of the inverse both in its utilization of sparsity and its control of roundoff errors. However, it is more complicated both in notation and in the operations involved. For this reason we have chosen to set the background for key ideas in the use of products of elementary matrices by first describing the product form of the inverse, and only then discussing the LU factorization. If the background ideas are familiar to the reader, it is possible to skip Section 7.5.1 and turn directly to Section 7.5.2.

7.5.1 The Product Form of the Inverse To develop the product form of the inverse, consider a simplex iteration with basis matrix B. Suppose that at the end of this iteration, the sth basic variable is replaced by xt . The new basis matrix B¯ is obtained from B by replacing its sth column by At . Since Aˆ t = B −1 At (or BAˆ t = At ), it follows that B¯ = BF, where

⎛1 ⎜ ⎜ ⎜ F =⎜ ⎜ ⎝

⎡ 1



⎢ ⎥ .. ⎢ ⎥ .⎢ ⎥ ⎢ˆ ⎥ ⎢At ⎥ ⎣ ⎦ .. .

⎞ ⎟ ⎟ ⎟ ⎟ ⎟ ⎠

1 is obtained from the identity matrix by replacing its sth column by Aˆ t .

i

i i

i

i

i

i

7.5. Representation of the Basis

book 2008/10/23 page 241 i

241

Denoting E = F −1 , the new inverse matrix is obtained by multiplying B −1 from the left by E: B¯ −1 = EB −1 . It is easy to verify that E also differs from the identity matrix only in its sth column ⎛1 ⎡ ⎤ ⎞ ⎜ ⎜ ⎜ ⎜ E=⎜ ⎜ ⎜ ⎝

1

⎢ ⎥ .. ⎢ ⎥ .⎢ ⎥ ⎢ ⎥ ⎢η⎥ ⎢ ⎥ .. ⎢ ⎥ . ⎣ ⎦

⎟ ⎟ ⎟ ⎟ ⎟, ⎟ ⎟ ⎠

1 1

where

⎛ −aˆ /aˆ ⎞ 1,t s,t .. ⎟ ⎜ . ⎟ ⎜ ⎟ ⎜ ⎜ −aˆ s−1,t /aˆ s,t ⎟ ⎟ ⎜ η = ⎜ 1/aˆ s,t ⎟ ⎟ ⎜ ⎜ −aˆ s+1,t /aˆ s,t ⎟ ⎟ ⎜ .. ⎠ ⎝ . −aˆ m,t /aˆ s,t

and aˆ j,t are the entries in Aˆ t (see the Exercises). The matrix E is called an elementary matrix and the vector η is called an eta vector; one can show that the pivot operations performed on Aˆ are achieved by multiplying Aˆ on the left by E (see the Exercises). Suppose that we start the simplex algorithm with an initial basis matrix B1 = I . Let E1 denote the elementary matrix corresponding to the pivot operations in the first iteration. Then at the second iteration the inverse basis matrix is B2−1 = E1 B1−1 = E1 . Similarly, in the third iteration, B3−1 = E2 B2−1 = E2 E1 , and in general at the kth iteration the inverse basis matrix is Bk−1 = Ek−1 Ek−2 · · · E2 E1 , where Ei is the elementary matrix corresponding to iteration i. This representation of the basis matrix inverse is known as the product form of the inverse. The basis matrix inverse is not formed explicitly, but kept as a product of its factors. Since each elementary matrix is uniquely defined by its eta vector and its column position, it may be stored compactly. For historic reasons, the collection of eta vectors corresponding to E1 , E2 , . . . , Ek is known as the eta file. How can we perform the simplex computations without explicitly forming B −1 ? The matrix is not needed explicitly, but only to provide matrix-vector products. In the simplex method these operations occur in two forms: (a) premultiplication—multiplication of a column vector from the left (bˆ = B −1 b and Aˆ t = B −1 At ); and (b) postmultiplication— multiplication of a row vector from the right (y T = cBT B −1 ). We now show how these operations can be performed. A computation of the form Bk−1 a is performed sequentially via Bk−1 a = Ek−1 (Ek−2 (Ek−3 (· · · (E2 (E1 a)) · · ·))),

i

i i

i

i

i

i

242

book 2008/10/23 page 242 i

Chapter 7. Enhancements of the Simplex Method

by first premultiplying a by E1 , next premultiplying the resulting vector by E2 , and so forth. This operation is called a forward transformation (Ftran), because it corresponds to a forward scan of the eta file. A computation of the form cTBk−1 is performed sequentially via cTBk−1 = ((· · · (((cTEk−1 )Ek−2 )Ek−3 ) · · ·)E2 )E1 by first postmultiplying cT by Ek−1 , then postmultiplying the result by Ek−2 , and so forth. This operation is called a backward transformation (Btran), because it corresponds to a backward scan of the eta file. Each matrix operation with respect to an elementary matrix is fast and simple. To see this, let E be an elementary matrix with eta vector η in its sth column. Then a matrix-vector product of the form Ea for some vector a is computed as ⎛

⎞ a1 .. ⎜ ⎟ ⎜ .. ⎟ . ⎜ ⎟⎜ . ⎟ ⎜ ⎟⎜ ⎟ Ea = ⎜ ηs ⎟ ⎜ as ⎟ ⎜ ⎟⎜ . ⎟ .. . . ⎝ ⎠ ⎝ .. ⎠ . . am ηm 1 ⎛ ⎞ ⎛ ⎞ ⎛ ⎞ a1 + η1 as η1 a1 .. ⎜ ⎟ ⎜ .. ⎟ ⎜ .. ⎟ . ⎜ ⎟ ⎜ . ⎟ ⎜ . ⎟ ⎜ ⎟ ⎜ ⎟ ⎜ ⎟ = ⎜ ηs as ⎟ = ⎜ 0 ⎟ + a s ⎜ ηs ⎟ . ⎜ ⎟ ⎜ ⎟ ⎜ . ⎟ . .. ⎝ ⎠ ⎝ .. ⎠ ⎝ . ⎠ . . am a m + η m as ηm 1

η1 .. .

⎞⎛

The rule is, replace the sth term of a by zero, and add to that as times η. The matrix E need not be formed explicitly. Example 7.6 (Premultiplication of a Column Vector). Consider the 4×4 elementary matrix E defined by ⎛ 3⎞ −2 ⎜ 1⎟ ⎜ ⎟ s = 3, η = ⎜ 1 ⎟ . ⎝ 2⎠ −3 This matrix is obtained from the identity matrix by replacing its third column by η. Let a = (7, −3, 4, 2)T. Then the matrix-vector product Ea is computed as ⎛ 3⎞ ⎛ ⎛ ⎞ ⎛ ⎞ ⎞ −2 7 a1 1 ⎜ 1⎟ ⎜ −3 ⎟ ⎜a ⎟ ⎟ ⎜ 1 ⎟ ⎜ Ea = ⎝ 2 ⎠ + a3 η = ⎝ ⎠ + 4⎜ 1 ⎟ = ⎝ ⎠. 0 0 2 ⎝ 2⎠ a4 2 −10 −3 The computation was carried out without explicitly forming the matrix E.

i

i i

i

i

i

i

7.5. Representation of the Basis

243

A vector product of the form cTE is computed as ⎛ 1 ⎜ ⎜ 1 ⎜ ⎜ cTE = ( c1 c2 . . . cs . . . cm ) ⎜ ⎜ ⎜ ⎜ ⎝ = ( c1 = ( c1

book 2008/10/23 page 243 i

c2

. . . cs−1

c2

. . . cs−1

..

.

η1 .. . .. . ηs .. .

ηm (c1 η1 + · · · + cm ηm ) cs+1 cTη cs+1 . . . cm ) .



..

.

⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎠

1 . . . cm )

Thus, the computation leaves c unchanged except for its sth component which is replaced by cTη. Example 7.7 (Postmultiplication of a Row Vector). Consider the matrix E in the previous example, and let cT = (−1, 2, −3, 4). The matrix-vector product cTE is computed as follows: cTE = ( c1 c2 cTη c4 ) = ( −1 2 −10 4 ) , ⎛

since c η = ( −1 T

2

−3

− 32



⎟ ⎜ ⎜ 1⎟ ⎜ 4)⎜ 1 ⎟ ⎟ = −10. ⎝ 2⎠ −3

We can now outline the steps of the kth iteration of the product-form version of the simplex method. Available at this iteration is a basis matrix inverse Bk−1 , represented as a product of elementary matrices Ek−1 · · · E1 . Each elementary matrix Ei is represented by its eta vector ηi and its row index si . We also have available xB = bˆ = Bk−1 b. The steps of the algorithm are given below. 1. The Optimality Test—Compute y T = cBT Ek−1 Ek−2 · · · E1 . Compute the coefficients cˆj = cj − y TAj for the nonbasic variables xj . If cˆj ≥ 0 for all nonbasic variables, then the current basis is optimal. Otherwise, select a variable xt that satisfies cˆt < 0 as the entering variable. 2. The Step—Compute the entering column Aˆ t = Ek−1 Ek−2 · · · E1 At . Find an index s = sk that satisfies   bˆi bˆs = min : aˆ i,t > 0 . 1≤i≤m aˆ s,t aˆ i,t This ratio test determines the leaving variable and the pivot entry aˆ s,t . If aˆ i,t ≤ 0 for all i, then the problem is unbounded.

i

i i

i

i

i

i

244

book 2008/10/23 page 244 i

Chapter 7. Enhancements of the Simplex Method

−1 : Form the eta vector ηk that transforms 3. The Update—Update the inverse matrix Bk+1 ˆ Aˆ t to the sth column of the identity matrix. Update the solution vector xB = Ek b.

In the computation of the new basic variables some savings can be achieved, since xB = ˆ Ek Bk−1 b = Ek b. In the following example we solve a problem with the simplex method using the product form of the inverse. The same problem was solved in Sections 5.2 and 5.3. Example 7.8 (Simplex Method Using the Product Form of the Inverse). Consider the problem minimize z = −x1 − 2x2 subject to −2x1 + x2 ≤ 2 −x1 + 2x2 ≤ 7 x1 ≤ 3 x1 , x2 ≥ 0. Slack variables are added to put it in standard form: minimize subject to

z = −x1 − 2x2 −2x1 + x2 + x3 = 2 −x1 + 2x2 + x4 = 7 x1 + x5 = 3 x1 , x2 , x3 , x4 , x5 ≥ 0.

We start with xB = (x3 , x4 , x5 )T. The basis matrix B1 is the identity matrix. Iteration 1. Since cBT = (0, 0, 0), our initial vector of simplex multipliers is y T = (0, 0, 0). Pricing the nonbasic variables, we obtain cˆ1 = c1 − y TA1 = −1 − 0 = −1,

cˆ2 = c2 − y TA2 = −2 − 0 = −2,

and we choose x2 as the entering variable (corresponding to the most negative reduced cost). The entering column is   1 −1 Aˆ 2 = B1 A2 = I A2 = 2 . 0 The ratio test with the right-hand-side vector bˆ T = (2, 7, 3)T gives the first basic variable x3 as the leaving variable. We can now update B2−1 by updating the eta vector for E1 :       1/1 1 1/aˆ 1,2 η1 = −aˆ 2,2 /aˆ 1,2 = −2/1 = −2 . 0/1 0 −aˆ 3,2 /aˆ 1,2 We also record the position of η1 in E1 : s1 = 1. Updating the resulting solution, we obtain   x2 xB = x4 = B2−1 b = E1 b x5         2 0 1 2 = E1 7 = 7 + 2 −2 = 3 . 3 3 0 3

i

i i

i

i

i

i

7.5. Representation of the Basis

book 2008/10/23 page 245 i

245

Iteration 2. Updating the vector of multipliers gives y T = cBT B2−1 = cBT E1 = ( −2

0

0 ) E1 = ( −2

0

0).

Pricing the nonbasic variables, we obtain 

 −2 cˆ1 = c1 − y A1 = −1 − ( −2 0 0 ) −1 = −5 1   1 cˆ3 = c3 − y TA3 = 0 − ( −2 0 0 ) 0 = 2, 0 T

and hence the solution is not optimal and x1 will enter the basis. Computing the entering column, we obtain Aˆ 1 = B2−1 A1 = E1 A1         −2 0 1 −2 = E1 −1 = −1 + (−2) −2 = 3 . 1 1 0 1 Performing the ratio test with respect to the right-hand-side vector, we conclude that the second basic variable x4 will leave and will be replaced by x1 . The new eta vector is    ⎛ 2/3 ⎞  −(−2)/3 −aˆ 1,1 /aˆ 2,1 = = ⎝ 1/3 ⎠ . η2 = 1/3 1/aˆ 2,1 −(1)/3 −a3,1 /aˆ 2,1 −1/3 The eta file now includes the following information:  s1 = 1

and

η1 = ⎛

s2 = 2

and

η2 =

1 −2 0

2 3 ⎜ 1 ⎝ 3 − 13

 ⎞ ⎟ ⎠.

Updating the solution, we obtain   x2 xB = x1 = B3−1 b = E2 E1 b x5 ⎛ 2⎞     3 4 2 ⎟ ⎜ = E2 bˆ = 0 + 3 ⎝ 13 ⎠ = 1 . 2 3 −1 3

Iteration 3. To test for optimality we first compute y T = cBT B3−1 = (( −2

−1

0 ) E2 ) E1 = ( −2

− 53

0 ) E1 = ( 43

− 53

0).

i

i i

i

i

i

i

246

book 2008/10/23 page 246 i

Chapter 7. Enhancements of the Simplex Method

Pricing yields cˆ3 = c3 − y A3 = 0 − (

4 3

− 53

cˆ4 = c4 − y TA4 = 0 − ( 43

− 53

T

  1 0 ) 0 = − 43 0   0 0 ) 1 = 53 , 0

and hence the solution may be improved by letting x3 enter the basis. To determine the leaving variable, we compute the entering column Aˆ 3 = B3−1 A3 = E2 E1 A3   '   ( 1 0 1 = E2 E1 0 = E2 0 + 1 −2 0 0 0 ⎛ 2⎞ ⎛ 1⎞     −3 3 1 1 ⎜ 1⎟ ⎜ 2⎟ = E2 −2 = 0 − 2 ⎝ 3 ⎠ = ⎝ − 3 ⎠ . 0 0 2 −1 3

3

The ratio test results in the third basic variable x5 leaving the basis. At the end of this iteration we update the eta file with ⎛1⎞ 2

s3 = 3

and

η3 = ⎝ 1 ⎠ . 3 2

Updating the solution gives  xB =

x2 x1 x3

 = B4−1 b = E3 E2 E1 b ⎛1⎞     5 4 2 = E3 bˆ = 1 + 2 ⎝ 1 ⎠ = 3 . 3 3 0 2

Iteration 4. Updating the multiplier vector yields y T = cBT B4−1 = ((( −2 −1 0 ) E3 ) E2 ) E1 = (( −2 −1 −2 ) E2 ) E1 = ( −2

−1

−2 ) E1 = ( 0

−1

−2 ) .

Pricing yields cˆ4 = c4 − y A4 = 0 − ( 0

−1

cˆ5 = c5 − y TA5 = 0 − ( 0

−1

T

  0 −2 ) 1 = 1 0   0 −2 ) 0 = 2, 1

i

i i

i

i

i

i

7.5. Representation of the Basis

book 2008/10/23 page 247 i

247

and the optimality conditions are satisfied. Our solution is x1 = 3 and x2 = 5, with slack variables x3 = 3, x4 = 0, x5 = 0, and objective z = −x1 − 2x2 = −13. From the example above, the product form of the simplex method may appear to be cumbersome. Indeed, this problem is too small and dense to afford any computational savings. The major savings of the product form occur when the problem is large and sparse. In such problems, the eta vectors corresponding to the elementary matrix tend to be sparse. The result is reduced storage and fewer computations. Example 7.9 (Sparsity of Eta Vectors). Consider the basis matrix ⎛

1 ⎜1 ⎜ B = ⎜0 ⎝ 0 0

0 1 1 0 0

0 0 1 1 0

0 0 0 1 1

⎞ 1 0⎟ ⎟ 0⎟. ⎠ 0 1

To obtain B −1 , we start with a 5 × 5 identity matrix and sequentially replace its ith column by the ith column of B. At each step we update the inverse of the resulting matrix, using the diagonal elements as the pivots (si = i). Let B0 = I , and let bi be the ith column of B. We transform B0 in five stages to B5 = B. The first eta vector is obtained from b1 . The second eta vector is obtained from E1 b2 . The last eta vector is obtained from E4 E3 E2 E1 b5 . This procedure yields the following eta vectors: ⎛

⎞ 1 ⎜ −1 ⎟ ⎜ ⎟ η1 = ⎜ 0 ⎟ , ⎝ ⎠ 0 0



⎞ 0 ⎜ 1⎟ ⎜ ⎟ η2 = ⎜ −1 ⎟ , ⎝ ⎠ 0 0



⎞ 0 ⎜ 0⎟ ⎜ ⎟ η3 = ⎜ 1 ⎟ , ⎝ ⎠ −1 0



⎞ 0 ⎜ 0⎟ ⎜ ⎟ η4 = ⎜ 0 ⎟ , ⎝ ⎠ 1 −1



− 12



⎜ 1⎟ ⎜ 2⎟ ⎜ 1⎟ ⎟ η5 = ⎜ ⎜ −2 ⎟ . ⎜ 1⎟ ⎝ 2⎠ 1 2

Thus most of the eta vectors are sparse. In contrast, the explicit inverse ⎛ B −1 =

1 2 ⎜ −1 ⎜ 2 ⎜ 1 ⎜ 2 ⎜ ⎜ 1 ⎝ −2 1 2

1 2 1 2 − 12 1 2 − 12

− 12 1 2 1 2 − 12 1 2

1 2 − 12 1 2 1 2 − 12

− 12 ⎞ 1 ⎟ 2 ⎟ ⎟ − 12 ⎟ ⎟ 1 ⎟ 2 ⎠ 1 2

is completely dense. Consider now a dense vector a. The matrix-vector product B −1 a will require 13 multiplications if the product form of the inverse is used; however, it will require 25 multiplications if the explicit inverse is used (see the Exercises).

i

i i

i

i

i

i

248

7.5.2

book 2008/10/23 page 248 i

Chapter 7. Enhancements of the Simplex Method

Representation of the Basis—The LU Factorization

In the previous subsection we represented B −1 as a product of elementary matrices and showed how to compute the vector of basic variables xb = B −1 b, the simplex multipliers y T = cBT B −1 , and the entering column Aˆ t = B −1 At using this representation. This method is no longer in wide use, since an approach based on Gaussian elimination is superior in terms of its numerical accuracy, the overall number of operations required, and the greater flexibility in utilizing sparsity and controlling the fill-in of nonzeroes. The application of Gaussian elimination modifies the computations within the simplex algorithm. Rather than using the formulas based on B −1 , we solve a system of equations with respect to the matrix B. Thus xb , y T, and Aˆ t are computed as solutions of the systems Bxb = b,

y TB = cBT ,

BAˆ t = At .

The key idea in the method is to reduce the system via elementary row operations to an equivalent system where the matrix is upper triangular. One of the main techniques for utilizing sparsity in Gaussian elimination is the switching of rows or switching of columns. Intuitively, we would like to get a matrix that is “almost” upper triangular to begin with. Judicious switching of rows can also help control the roundoff error. Our discussion below assumes that we are using row permutations; for example we might perform partial pivoting where rows are switched so that the pivot element is the element of largest magnitude in the noneliminated part of its column. We will ignore the effect of column permutations, but note that a change in the order of the columns is simply a change in the order of the variables. To utilize sparsity in Gaussian elimination, it is advantageous to represent the sequence of operations required for the triangularization in product form: Lr Pr · · · L1 P1 B = U, where the matrices Li are lower triangular pivot matrices and the matrices Pi are permutation matrices (see Appendix A.6). Each of these matrices can be stored in a compact form. The number r here represents the number of Gaussian pivots used to transform B into an upper triangular matrix, and U is the transformed upper triangular system matrix. If we write L¯ = Lr Pr · · · L1 P1 , ¯ = U . When no row permutations are required (that is, Pi = I ), then L¯ is a lower then LB triangular matrix, and so is its inverse. Letting L = L¯ −1 , we can write B as a product of lower and upper triangular matrices B = LU. Because of this representation, the method is also called the LU factorization or LU decomposition. In the more general case, where row permutations are used, the matrix L¯ and hence L may no longer be lower triangular, but the method is still known as the LU factorization. Our overview of the implementation of the LU factorization will begin with a discussion of the method for computing the factors of the LU decomposition, storing them in

i

i i

i

i

i

i

7.5. Representation of the Basis

book 2008/10/23 page 249 i

249

compact form, and performing computations using this compact form. Next we will discuss how to solve the systems of equations that arise in the course of a simplex iteration. Finally, we will discuss how to update the factorization following a simplex iteration, when one variable leaves the basis and another variable enters. We start with the triangulization of the matrix B: Lr Pr · · · L1 P1 B = U. For simplicity we denote the intermediate (“partially” upper triangular) matrices generated in the course of the factorization (regardless of the step) by Uˆ . The Pi matrices are elementary permutation matrices formed by switching two rows of the identity. Specifically, if P is an elementary permutation matrix obtained by switching rows j and k of the identity, then the operation P Uˆ switches rows j and k of Uˆ (see the Exercises). In general the permutation matrix need not be formed explicitly. Only the indices of the rows being interchanged need be stored. If P , say, interchanges rows j and k, then multiplying P from the right by a column vector, or from the left by a row vector, simply switches elements j and k of the vector. The matrices Li are the matrices that perform the elementary row operations involved in Gaussian elimination. The matrix Li that pivots on column s of Uˆ is the identity matrix with its sth column replaced by ⎞ ⎛ 0 .. ⎟ ⎜ . ⎟ ⎜ ⎟ ⎜ 0 ⎟ ⎜ ⎟ ⎜ 1 η=⎜ ⎟ ← s, ⎟ ⎜ −uˆ ⎜ s+1,s /uˆ s,s ⎟ ⎟ ⎜ .. ⎠ ⎝ .

−uˆ m,s /uˆ s,s

where uˆ j,s are the entries in Uˆ (see the Exercises). Denoting column s of the identity matrix by es , we can write Li as Li = I + (η − es )esT. The elementary matrices need not be formed explicitly. Only the index s of the pivot term and the lower part of the eta vector containing entries s + 1, . . . , m need be stored. Using just this information, it is easy to premultiply or postmultiply the matrix by a vector. For example, ⎛ ⎞ 0 ⎜ ... ⎟ ⎜ ⎟ ⎜ 0 ⎟ ⎜ ⎟ T Li a = (I + (η − es )es )a = a + (η − es )as = a + as ⎜ ⎟. ⎜ ηs+1 ⎟ ⎜ . ⎟ ⎝ .. ⎠ ηm Thus, to compute Li a we take the vector a and add to its subdiagonal portion (components s + 1, . . . , m) the corresponding portion of as times η.

i

i i

i

i

i

i

250

book 2008/10/23 page 250 i

Chapter 7. Enhancements of the Simplex Method Forming cTLi is also easy, since cTLi = cT(I + (η − es )esT) = cT + (cTη − cs )esT = ( c1 c2 . . . cs−1 cTη cs+1 . . . cm ) .

Thus, the computation cTLi leaves c unchanged, except for its sth component which is replaced by cTη. Factorization of the matrix B using the product form is done a column at a time, starting with its first column. At the beginning of step k we typically have an “eta file” consisting of the eta vectors from the previous iterations, their associated pivot index, and the permutations applied. Available also are columns 1, . . . , k − 1 of U . In the course of triangularizing column k of B we first compute the effect of all previous row operations on the column. After a possible row interchange, the top part of the resulting vector will be column k of U , while the subdiagonal portion will define the elimination eta vector. Example 7.10 (LU Factorization). We will illustrate the factorization using the 3 × 3 example   1.6 −4.2 −0.8 B = 4.0 1.5 3.0 8.0 −1.0 1.0 from Appendix A.6. We will use partial pivoting which chooses at each iteration k the pivot term with largest magnitude from among those available. At the first step, rows 1 and 3 are switched: P1 :

1 ↔ 3;

therefore P1 is defined by the pair (1, 3) indicating that P1 is obtained by switching the first and third rows of the identity matrix. The effect of this on the first column of B is   8.0 P1 B1 = 4.0 . 1.6 We now record the first column of U , the eta vector, and the row index of the pivot:     8 1 U1 = 0 , η1 = −0.5 , s1 = 1. 0 −0.2 Only the second and third components of η1 need be stored since the first component will always be 1. At the second step we first reconstruct the effect of L1 P1 on the second column of B:           −4.2 −1 −1 0 −1 L1 P1 B2 = L1 P1 1.5 = L1 1.5 = 1.5 − −0.5 = 2 . −1 −4.2 −4.2 0.2 −4 Since the third element is greater than the second we define P2 by the pair (2, 3): P2 :

2 ↔ 3.

i

i i

i

i

i

i

7.5. Representation of the Basis

251

Since

 P2 Bˆ 2 =

we obtain

book 2008/10/23 page 251 i

−1 −4 2

 ,



   −1 0 U2 = −4 , η2 = 1 , s2 = 2. 0 0.5 Here only the third element of η2 need be stored. At the third and last step we reconstruct the effect of L2 P2 L1 P1 on the third column of B:     −0.8 1 = L2 P2 L1 L2 P2 L1 P1 B3 = L2 P2 L1 P1 3 3 1 −0.8 '   (   1 0 1 = L2 P2 = L2 P2 3 + −0.5 2.5 −0.8 −0.2 −1         1 1 0 1 = L2 −1 = −1 − 0 = −1 . 2.5 2.5 0.5 2 We obtain

 U3 =

1 −1 2

 .

¯ = U to obtain To solve a system of the form Bx = a we use the fact that LB ¯ La = U x. We compute the vector ¯ = Lr Pr · · · L1 P1 a w = Lb and then solve U x = a. ¯ = U to obtain Likewise, to solve a system y B = cT, we use the fact that LB −1 T T T ¯ −1 T¯ T ¯ y L U = c . Defining u = y L (so that u L = y ) we first solve for u in T

T

uT U = c T , and then compute y:

y T = uTL¯ = uTLr Pr · · · L1 P1 .

Example 7.11 (Solution of System of Equations). Consider the system Bx = a, where B is the matrix in the previous example and a = (0, 10, 10)T. We first compute     0 10 w = L2 P2 L1 P1 b = L2 P2 L1 P1 10 = L2 P2 L1 10 10 0       10 10 10 = L2 P2 5 = L2 −2 = −2 . −2 5 4

i

i i

i

i

i

i

252

book 2008/10/28 page 252 i

Chapter 7. Enhancements of the Simplex Method

Solving the system U x = w, we obtain through backsubstitution that 2x3 = 4 → x3 = 2 −4x2 − 2 = −2 → x2 = 0 8x1 + 2 = 10 → x1 = 1 so the solution is x = (1, 0, 2)T. Consider now the system y TB = cT where c = (32, −20, 4)T. We first solve for u in uTU = cT to obtain 8u1 = 32 → u1 = 4 −4 − 4u2 = −20 → u2 = 4 4 − 4 + 2u3 = 4 → u3 = 2 ¯ so that u = (4, 4, 2)T. Next we compute y T = uTL: y T = uTL2 P2 L1 P1 = ( 4 4 2 ) L2 P2 L1 P1 = ( 4 5 2 ) P2 L1 P1 = ( 4 2 5 ) L1 P1 = ( 2 2 5 ) P1 = ( 5 2 2 ) . So far we have described how to factor the initial basis matrix B. In most simplex iterations—when one variable leaves the basis and another variable enters the basis—we do not factor B from scratch. Instead the existing factorization is updated by performing additional elementary row operations and permutations. As a result, the number of factors in the LU decompositions gradually increases from iteration to iteration. After some number of iterations this ceases to be efficient, since the effort to update and use the factorization grows with each iteration. It may also be true that the accuracy of the factorization has deteriorated. At this point a new LU factorization of the current basis matrix is computed using the techniques we have just described. This step is called a refactorization. A refactorization is also typically performed at the final iteration (see Section 7.6.3). We now describe the technique for updating the factorization when the basis changes. We will describe here the technique proposed by Bartels and Golub (1969). Suppose that ¯ = U , where { Bi } and { Ui } are the columns of B and U , respectively. Then LB ¯ = L¯ ( B1 LB

· · · Bm ) = ( U1

· · · Um ) = U.

Let a = At and Bi be the columns associated with the entering and leaving variables, respectively. Instead of replacing Bi by a, we will delete Bi from B, shift columns Bi+1 , . . . , Bm one position to the left, and insert the new column a at the end. This will give the updated basis matrix B¯ with L¯ B¯ = L¯ ( B1 · · · Bi−1 Bi+1 · · · Bm a ) = ( U1 · · · Ui−1 Ui+1 · · · Um w ) ≡ Uˆ , where

¯ w = La.

The reordering of the columns of B¯ corresponds to a reordering of the basic variables xB . The vector w can be obtained as a by-product of the computation of the entering column Aˆ t , since it is computed in the first step of the solution of the system BAˆ t = a.

i

i i

i

i

i

i

7.5. Representation of the Basis

253 transformed entering column

leaving column

X

U=

book 2008/10/23 page 253 i

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

X

U =

X

columns to be shifted

entries to be eliminated

Figure 7.2. Updating a factorization. The columns of B¯ are reordered so as to simplify the updating of the LU factorization. As is seen in Figure 7.2, the matrix Uˆ is almost upper triangular—the only entries that need to be eliminated are just below the main diagonal in columns i, . . . , m − 1. The subdiagonal entries in Uˆ are eliminated using Gaussian elimination with partial pivoting. For column j (j = i, . . . , m − 1) the values |uˆ j,j | and |uˆ j +1,j | are compared. If |uˆ j,j | < |uˆ j +1,j |, then rows j and j + 1 of Uˆ are interchanged. Then the entry Uˆ j +1,j in the resulting matrix is eliminated. The resulting eta vector will only have one element other than the diagonal, so storage is minimal. The update procedure corresponds to an LU factorization of Uˆ , resulting in an updated upper triangular matrix U¯ . Example 7.12 (Updating the LU Factorization). Consider the basis matrix ⎛ 2 ⎜ −1 ⎜ ⎜ B = ⎜ − 12 ⎜ ⎝ 1 0

−1

0 2

1

5 2

−1

−1

−1

2

1

0

1

3 2 1 2

1 2

−2 ⎞ 1⎟ ⎟ 1 ⎟. ⎟ 2 ⎟ −2 ⎠ 5 2

In the course of the factorization we find that no permutations are required, that the eta vectors corresponding to pivot indices s1 = 1, s2 = 2, s3 = 3, and s4 = 4 are ⎛ ⎞ ⎞ ⎛ 0⎞ ⎛ ⎞ ⎛ 1 0 0 ⎜ 12 ⎟ ⎜ 1⎟ ⎜ 0⎟ ⎜ 0⎟ ⎜ ⎟ ⎟ ⎜ 1⎟ ⎜ ⎟ ⎜ ⎜ 1⎟ ⎜ ⎜ ⎜ 0⎟ ⎟ ⎟ − 1 ⎟ 4 = = , η = η1 = ⎜ , η , η ⎟, ⎜ ⎜ ⎟ ⎜ ⎟ 2 3 4 ⎜ 4⎟ ⎟ ⎜ 1⎟ ⎜ ⎟ ⎜ ⎜ −1 ⎟ 0 1 ⎠ ⎝ 2⎠ ⎝ ⎠ ⎝ ⎝ 2⎠ 1 1 1 0 2

i

i i

i

i

i

i

254

book 2008/10/23 page 254 i

Chapter 7. Enhancements of the Simplex Method

and that the resulting upper triangular matrix is ⎛ ⎞ 2 −1 0 1 −2 1 2 1 0⎟ ⎜0 ⎜ ⎟ U = ⎜0 0 2 −1 0⎟. ⎝ ⎠ 0 0 0 2 −1 0 0 0 0 2 ¯ 4 L3 L2 L1 is not formed explicitly, we will construct it here to Although the matrix LL facilitate the exposition: ⎞ ⎛ 1 0 0 0 0 ⎜ 1 1 0 0 0⎟ ⎟ ⎜ 2 ⎟ ⎜ 1 1 ⎜ ¯ 1 0 0⎟ L = ⎜ 4 −4 ⎟. ⎟ ⎜ 1 1 0 1 0⎠ ⎝ −2 2 0

−1

1 2

1

1

Suppose that the entering column for the new basis is ⎛ ⎞ 2 ⎜ 0⎟ ⎜ ⎟ a = ⎜ −1 ⎟ ⎝ ⎠ 4 3 and that

⎛ 2⎞ ⎜ 1⎟ ⎜ 3⎟ ¯ = ⎜ −4 ⎟ . w = La ⎜ ⎟ ⎝ 7⎠ 2

3 The new basis matrix (with column 2 deleted and a inserted at the end) is ⎛ 2 0 1 −2 2⎞ ⎜ −1 ⎜ ⎜ B¯ = ⎜ − 12 ⎜ ⎝ 1 1 2

2

1 2

1

5 2

1 2

−1

−1 2

−2

0

1

5 2

0⎟ ⎟ ⎟ −1 ⎟ ⎟ 4⎠ 3

and thus U is transformed into (with column 2 deleted and w at the end) ⎛2 0 1 −2 2⎞ ⎜0 2 ⎜0 2 Uˆ = ⎜ ⎜ ⎝0 0 0

0

1 −1

0 0

2

−1

0

2

1⎟ − 34 ⎟ ⎟. ⎟ 7 ⎠ 2

3

Gaussian elimination is then applied to this matrix.

i

i i

i

i

i

i

7.5. Representation of the Basis

book 2008/10/23 page 255 i

255

We start with column 2. No row interchange is required, so P5 = I . The elementary matrix L5 corresponding to pivot term s5 = 2 and eta vector ⎛ ⎞ 0 ⎜ 1⎟ ⎜ ⎟ η5 = ⎜ −1 ⎟ ⎝ ⎠ 0 0 is used to eliminate the (3, 2) entry. The effect of this on the third column of Uˆ is ⎛ ⎞ ⎛ ⎞ 1 1 ⎜ 1⎟ ⎜ 1⎟ ⎜ ⎟ ⎜ ⎟ L5 ⎜ −1 ⎟ = ⎜ −2 ⎟ . ⎝ ⎠ ⎝ ⎠ 2 0 0 0 Again no interchange is required (so P6 = I ), and the elementary matrix L6 corresponding to pivot term s6 = 3 and eta vector ⎛ ⎞ 0 ⎜0⎟ ⎜ ⎟ η6 = ⎜ 1 ⎟ ⎝ ⎠ 1 0 eliminates the (4, 3) entry. The effect of these operations on the fourth column of Uˆ is ⎛ ⎞ ⎛ ⎞ ⎛ ⎞ −2 −2 −2 ⎜ 0⎟ ⎜ 0⎟ ⎜ 0⎟ ⎜ ⎟ ⎜ ⎟ ⎜ ⎟ L6 L5 ⎜ 0 ⎟ = L6 ⎜ 0 ⎟ = ⎜ 0 ⎟ . ⎝ ⎠ ⎝ ⎠ ⎝ ⎠ −1 −1 −1 2 2 2 Finally, a permutation matrix P7 :

4↔5

is used to interchange rows 4 and 5, and the elementary matrix L7 corresponding to pivot term s7 = 4 and eta vector ⎛ ⎞ 0 ⎜0⎟ ⎜ ⎟ ⎟ η7 = ⎜ ⎜ 01 ⎟ ⎝2⎠ 0 eliminates the (5, 4) entry. The effect of these operations on the fifth column of U are computed via ⎛ ⎛ ⎛ ⎛ ⎞ ⎛ ⎞ ⎞ ⎞ ⎞ 2 2 2 2 2 ⎜ 1⎟ ⎜ 1⎟ ⎜ 1⎟ ⎜ 1⎟ ⎜ 1 ⎟ ⎜ 3⎟ ⎜ 7⎟ ⎜ 7⎟ ⎜ 7⎟ ⎜ 7 ⎟ ⎜ −4 ⎟ ⎜ −4 ⎟ ⎜ −4 ⎟ ⎜ ⎟ ⎜ ⎟ L7 P7 L6 L5 ⎜ ⎟ = L7 P7 L6 ⎜ ⎟ = L7 P7 ⎜ ⎟ = L7 ⎜ − 4 ⎟ = ⎜ − 4 ⎟ . ⎜ 7⎟ ⎜ 7⎟ ⎜ 7⎟ ⎜ 3⎟ ⎜ 3 ⎟ ⎝ 2⎠ ⎝ 2⎠ ⎝ 4⎠ ⎝ ⎠ ⎝ ⎠ 7 13 3 3 3 4 4

i

i i

i

i

i

i

256

book 2008/10/23 page 256 i

Chapter 7. Enhancements of the Simplex Method

The resulting upper triangular matrix is ⎛

2 0 1 −2 ⎜0 2 1 0 ⎜ ⎜ ¯ U = ⎜ 0 0 −2 0 ⎝0 0 0 2 0 0 0 0

⎞ 2 1⎟ ⎟ − 74 ⎟ ⎟. 3⎠ 13 4

This corresponds to the transformation L7 P7 L6 L5 Uˆ = U¯ or in turn L7 P7 L6 L5 L4 L3 L2 L1 B¯ = U¯ . Although this example may seem daunting, when the problem is large and sparse, the sparsity of the eta vectors can be used to great advantage. Various other schemes have been developed to further accelerate the simplex iterations, either by attempting to reduce fill-in, or by devising approaches that have fast access to data in computer memory, based on the scheme for storing sparse data (see Appendix A.6.1). As an example, we note that the LU factorization we described uses row interchanges to maintain numerical stability. Unfortunately these interchanges can interfere with the sparse storage schemes used to represent the basis matrix. A related updating scheme has been proposed by Forrest and Tomlin (1972) that alleviates some of these difficulties. In this alternative, a row interchange is performed at every step of the elimination for Uˆ , regardless of the values of |uˆ j,j | and |uˆ j +1,j |. Because there is no choice about the interchange, this approach is less numerically stable. Nevertheless, the Forrest–Tomlin update can be superior computationally.

Exercises 5.1. Use the simplex method to solve the linear programs in Exercise 2.2 of Chapter 5. Use the product form of the inverse. 5.2. Consider the problem minimize subject to

z = 34x1 + 5x2 + 10x3 + 9x4 2x1 + x2 + x3 + x4 = 9 4x1 − 2x2 + 5x3 + x4 ≤ 8 4x1 − x2 + 3x3 + x4 ≥ 5 x1 , x2 , x3 , x4 ≥ 0.

Let x5 be the slack variable corresponding to the second constraint, x6 the surplus variable corresponding to the third constraint, and let x7 and x8 be the artificial variables corresponding to the first and third constraints, respectively. Assume that the problem was solved via the simplex method, using a two-phase approach. The

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 257 i

257

following information is available at the end of phase 1: xB = (x2 , x5 , x4 )T,   −1 s1 = 3, η1 = −1 1 ⎛1⎞ 2

s2 = 1,

⎜ ⎟ η2 = ⎝ 12 ⎠ . 1 2

Find the current basic solution. Determine if it is optimal for phase 2, and if not, find the optimal solution. Use the product form of the simplex method. 5.3. Let Aˆ be an m × n matrix. Suppose that aˆ s,t = 0. Let η be a vector of length m such that ηs = 1/aˆ s,t , and ηi = −aˆ i,t /aˆ s,t for i = s. Let E be the elementary matrix obtained by replacing the sth column of the m × m identity matrix by the vector η. (i) Prove that multiplying Aˆ on the left by E is equivalent to pivoting on Aˆ with aˆ s,t as the pivot. (ii) Let F be a matrix obtained by replacing the sth column of an m × m identity ˆ Prove that F −1 = E. matrix by the tth column of A. 5.4. Let E be an m × m elementary matrix with eta vector η. Suppose that η has l < m nonzero elements. Let a and c be dense vectors of length m. (i) Show that the matrix-vector product Ea requires l multiplications and l − 1 additions. (ii) Show that the matrix-vector product cTE requires l multiplications and l − 1 additions. 5.5. Compute the number of multiplications/divisions required in the kth iteration of the product form of the simplex method. (You may assume that the problem is dense.) Also compute the total number of multiplications/divisions required in k iterations of the product form of the simplex method. 5.6. Verify the calculations in Example 7.8. 5.7. Compute the inverse of the matrix ⎛ ⎞ 1 0 0 0 1 ⎜0 1 0 0 1⎟ ⎜ ⎟ B = ⎜0 0 1 0 1⎟ ⎝ ⎠ 0 0 0 1 1 1 1 1 1 6 by sequentially replacing the ith column of the identity matrix by the ith column of B and performing the required pivot operations. Show that most of the eta vectors obtained are sparse. Compute B −1 explicitly, and verify that it is a dense matrix. 5.8. Consider the matrix ⎛ ⎞ 4 0 0 2 ⎜0 1 3 0⎟ B=⎝ ⎠. 0 0 2 1 1 1 1 1

i

i i

i

i

i

i

258

book 2008/10/23 page 258 i

Chapter 7. Enhancements of the Simplex Method (i) Represent B −1 using the product form of the inverse. Incorporate the columns in order (first column 1, then column 2, and so on). (ii) Solve the linear system Bx = b with b = (1, −1, 1, −1)T using the productform representation from (i).

5.9. Assume that B is the current basis matrix, B¯ is the new basis matrix, As is the column corresponding to the leaving variable (and is in column s in B), and that At is the column corresponding to the entering variable. Show that B¯ −1 = EB −1 where E = I + (η − es )esT

5.10. 5.11. 5.12.

5.13.

5.14.

and es is column s of the identity matrix. Also show that B¯ = BF where F = I + (Aˆ t − Aˆ s )esT. Prove that the product of two lower triangular matrices is lower triangular. Prove that if the inverse of a lower triangular matrix exists, it is lower triangular. Let Ls be an m × m lower triangular elementary matrix formed by replacing the sth column of the identity matrix by η. Prove that L−1 s is obtained from the identity matrix by replacing entries j = s + 1, . . . , m of column s by −ηj . Suppose that Li and Lj are two lower triangular elementary matrices used in Gaussian elimination, formed by replacing the ith and j th columns of the identity matrix, respectively, by ηi and ηj . Prove that their product Li Lj is the identity matrix with columns i and j replaced by ηi and ηj , respectively. Consider the matrix factorization   ⎛1 0 0⎞  2 4 −2 2 4 −2 1 b= 1 6 5 = ⎝ 2 1 0⎠ 0 4 6 = LU. 0 2 11 0 0 8 0 12 1

Replace the first column of B by a = (1, 3, 4)T and compute the updated factorization. 5.15. Find an LU factorization of the matrix ⎛ ⎞ 0 2 4 B = ⎝ 1 0 5 ⎠. −2 2 0 Use partial pivoting. Note: Find the eta vectors for the factorization, but do not form the eta matrices. Use the result to solve the system y TB = cBT , where cBT = (2, 11, −8). 5.16. In a certain iteration of the simplex algorithm, the basic variables are x1 , x2 , and x3 , and the basis matrix is   0 −2 2 B= 1 −2 0 . −3 0 3 (i) Find the LU decomposition of the basis matrix using partial pivoting. Note: Find the eta vectors for the factorization, but do not form the eta matrices. (ii) Use the results of (i) to solve the system y TB = cBT , where cBT = (8, −10, 4).

i

i i

i

i

i

i

7.6. Numerical Stability and Computational Efficiency

book 2008/10/23 page 259 i

259

(iii) Suppose now that the second basic variable is replaced by x4 , whose constraint coefficients are A4 = ( 0 −2 3 )T . Let Bˆ be the new basis matrix. Compute the updates required to obtain the ˆ LU decomposition of B. (iv) Solve the system of equations  ˆ = Bx

10 0 12

 .

5.17. Compute the LU factorization of the matrix ⎛

1 ⎜0 ⎜ B = ⎜0 ⎝ 0 1 5.18. Consider the matrix



4 ⎜0 B=⎝ 0 1

0 1 0 0 1

0 0 1 0 1 0 1 0 1

0 0 0 1 1 0 3 2 1

⎞ 1 1⎟ ⎟ 1⎟. ⎠ 1 6 ⎞ 2 0⎟ ⎠. 1 1

(i) Find the LU decomposition of B using partial pivoting. Note: Find the eta vectors for the factorization, but do not form the eta matrices. (ii) Solve the linear system Bx = b with b = (1, −1, 1, −1)T using the productform representation from (i).

7.6

Numerical Stability and Computational Efficiency

A great deal of effort must be expended to translate the simplex method into a high-quality piece of software. Part of this effort is concerned with efficiency, making every step of the method run as efficiently as possible. But there are other issues, such as reliability and flexibility. Linear programming software should work effectively on a computer, where the arithmetic is subject to rounding errors, and where the problems may not satisfy the assumptions we have been routinely making (for example, that the constraint matrix has full row rank). In addition, the software should be able to solve problems that are not specified in standard form, but rather in a form that is more convenient to the user of the software. This section will describe some of the ideas and techniques that arise in the development of software for the simplex method. Ideally, we would like to say, “This is the best way to implement the simplex method,” but this is not possible. On different sets of problems, on different computers, and on different variants of the simplex method, the choices can be (and often are) different. Even subtle changes in the computer hardware can influence the

i

i i

i

i

i

i

260

book 2008/10/23 page 260 i

Chapter 7. Enhancements of the Simplex Method

way the software is written. If we tried to indicate the “best” techniques, there is a good chance that our description would almost immediately be out of date, or would be invalid in many contexts. There is another reason that limits our discussion. Many details of linear programming software have never been published. They are implemented in the computer software, but this software is often proprietary. Even if the corresponding algorithms have been published, the algorithmic descriptions may be less precise than the software, with many small but important details omitted. Such details of software craftsmanship are rarely mentioned in research publications. In this section we discuss a number of implementation issues: (a) the choice of the entering variable (pricing), (b) the choice of an initial basis, (c) tolerances for rounding errors, (d) scaling, (e) preprocessing, and (f) alternate model formats. The first issue will occupy most of our attention. Although many of our comments are motivated by specific software packages, our discussion here avoids any such identifications and frequently uses words like “often” and “usually.” This is an attempt to be accurate, as well as to avoid having our comments go quickly out of date. Software packages may include alternative choices for specific steps in the simplex method, with default choices selected to achieve good performance on a large class of problems. The alternatives may be invoked at the request of a particular user, or perhaps when the software itself identifies that the alternative might be preferable. Thus, from problem to problem, the behavior of the software may change.

7.6.1

Pricing

One of the most expensive operations in the simplex method is pricing, i.e., the optimality test. Because it is so expensive, simplex algorithms try to either reduce the costs of this step, or to make better use of all the calculations to select a more promising entering variable. Partial pricing is one technique for reducing the costs of the optimality test. Instead of computing all the coefficients cˆj ( full pricing), only a subset of these coefficients is computed (100, say). If one of the optimality conditions is violated, then this violation identifies an entering variable. If not, then another subset of the coefficients is computed. This continues until either an entering variable is identified, or until it is determined that the current basis is optimal. A much different approach to pricing is in fact to do extra calculations to identify a “better” entering variable. We will examine one such approach, called steepest-edge pricing. Suppose that at the current iteration, cˆt has been used to select the entering column Aˆ t . Then the variables x will be updated using the formula 

xB xN



 ←

xB xN

 + αpt ,

where α is the minimum ratio from the ratio test, and pt is an edge direction, that is, pt is a column of the matrix   −B −1 N . Z= I

i

i i

i

i

i

i

7.6. Numerical Stability and Computational Efficiency

book 2008/10/23 page 261 i

261

(See Section 5.4.2.) The initial portion of pt is the vector −Aˆ t = −B −1 At , and the corresponding reduced cost can be computed using cˆt = ct − cBT B −1 At = ( cBT

cNT ) pt = cTpt .

In our descriptions of the simplex method we have been selecting the entering variable as the variable with the most negative reduced cost: cˆt = min cTpj , j

where pj is the column of Z corresponding to Aj . We will refer to this as the steepest-descent pricing rule. If the entering variable is increased from zero to , then the objective decreases by cˆt , suggesting that this choice may give the greatest reduction (“steepest descent”) in the objective value. The steepest-descent rule has a drawback. It measures improvement in the objective per unit change in the variable xj . If the feasible region is rotated, then this measure would change, even though rotating the feasible region is merely a cosmetic change to the problem. It would be preferable to have a rule that was insensitive to transformations of this type. We would like to measure improvement in the objective per unit movement along an edge of the feasible region. The steepest-edge rule does this. It selects the entering variable using c T pj min   . j pj  The rule determines how the objective function is changing in the direction determined by the vector pj , without regard to the particular coordinate system used to represent it. A disadvantage of the steepest-edge rule is that it requires the computation of )  2    pj  = 1 +  Aˆ j  for all nonbasic columns j . Computing these norms in the obvious way would require computing {Aˆ j }, which would be prohibitively expensive. However, it is possible to update the values of the norms inexpensively as the basis changes. We will first show how to updateAˆ j . (This is just an intermediate step in the derivation of the steepest-edge rule; only the norm values are actually calculated by the algorithm.) To derive this, we need a formula for updating the inverse of the basis matrix. Let us assume that B is the current basis matrix, B¯ is the new basis matrix, As is the column corresponding to the leaving variable (and, for simplicity, is in column s in B), and At is the column corresponding to the entering variable. Then (see the Exercises) B¯ −1 = EB −1 , where E is a matrix of the form E = I + (η − es )esT

i

i i

i

i

i

i

262

book 2008/10/23 page 262 i

Chapter 7. Enhancements of the Simplex Method

and es is column s of an m × m identity matrix. More specifically, ⎛ −aˆ /aˆ ⎞ ⎛ ⎞ 1,t s,t 0 .. ⎟ ⎜ .. ⎟ ⎜ . ⎟ ⎜.⎟ ⎜ ⎟ ⎜ 0⎟ ⎜ −aˆ s−1,t /aˆ s,t ⎟ ⎜ ⎟ es − Aˆ t ⎟ ⎜ ⎜ η − es ≡ ⎜ 1/aˆ s,t , 1⎟ ⎟−⎜ ⎜ ⎟ = aˆ ⎟ ⎜ s,t ⎟ 0 ⎜ −aˆ s+1,t /aˆ s,t ⎟ ⎜ ⎟ ⎟ ⎜ ⎜ .. ⎠ ⎝ ... ⎠ ⎝ . 0 −aˆ m,t /aˆ s,t where Aˆ t is the entering column and aˆ s,t is the pivot entry at the current iteration. We also define σ ≡ B −T es , that is, σ is equal to row s of B −1 . Expanding the formula for B¯ −1 gives B¯ −1 = EB −1 = B −1 + (η − es )esTB −1 1 = B −1 + (es − Aˆ t )σ T. aˆ s,t Let Aj be a nonbasic column in both the current and the new basis. Then 1 (es − Aˆ t )σ TAj B¯ −1 Aj = B −1 Aj + aˆ s,t σ T Aj = Aˆ j + (es − Aˆ t ). aˆ s,t This formula can be used to update the norms of the vectors pj . First notice that  2  2  pj  = 1 +  Aˆ j  . 2  2  T If we define γj ≡ Aˆ j  = Aˆ j Aˆ j = (B −1 Aj )T(B −1 Aj ) and γ¯j ≡ B¯ −1 Aj  , then γ¯j = (B¯ −1 Aj )T(B¯ −1 Aj )  T 2  T  σ Aj σ Aj T = γj + (aˆ s,j − Aˆ j Aˆ t ). (1 − 2aˆ s,t + γt ) + 2 aˆ s,t aˆ s,t This formula can be reorganized to make it more suitable for computation. The final term can be adjusted using the identity T Aˆ j Aˆ t = (B −1 Aj )TAˆ t = ATj(B −TAˆ t ).

i

i i

i

i

i

i

7.6. Numerical Stability and Computational Efficiency

book 2008/10/23 page 263 i

263

Also, since 

σ T Aj 2 aˆ s,t

2

2 esTB −1 Aj =2 aˆ s,t aˆ s,t   aˆ s,j 2 =2 aˆ s,t aˆ s,t   aˆ s,j aˆ s,j =2 aˆ s,t  T  σ Aj aˆ s,j , =2 aˆ s,t 

aˆ s,t

two of the terms involving aˆ s,t cancel. As a result we obtain  γ¯j = γj +

σ T Aj aˆ s,t

2

 (1 + γt ) − 2

σ T Aj aˆ s,t



ATj(B −TAˆ t ).

A slightly different formula can be derived for the coefficient of the leaving variable. (See the Exercises.) This final formula is the basis for the steepest-edge rule. It requires the calculation of

B −TAˆ t , some additional inner products, as well as storage for γj and the initialization of these quantities. (The other calculations are by-products of the simplex method.) For sparse problems, many of the σ TAj terms can be zero, so the number of extra calculations required to implement this technique may not be excessive. Example 7.13 (Steepest Edge Update Formula). Consider the constraint matrix  A=

1 0 0

2 1 0

0 2 1

4 2 1

1 5 3

5 4 5

 .

We will begin with the basis xB = (x1 , x2 , x3 )T so that  B=

1 0 0

2 1 0

0 2 1



 and

B −1 =

1 0 0

−2 1 0

4 −2 1

 .

For the nonbasic columns, Aˆ 4 = B −1 A4 =

  4 0 , 1

 Aˆ 5 =

3 −1 3



 ,

and Aˆ6 =

17 −6 5

 .

The new basis will be x¯B = (x1 , x2 , x4 )T so that s = 3, t = 4, es = (0, 0, 1)T, and  B¯ =

1 0 0

2 1 0

4 2 1



 and

¯ −1

B

=

1 0 0

−2 1 0

0 −2 1

 .

i

i i

i

i

i

i

264

book 2008/10/23 page 264 i

Chapter 7. Enhancements of the Simplex Method

We will concentrate on the final two columns of A, the columns that remain nonbasic. Then aˆ s,t = 1, σ = B −T es = ( 0 0 1 )T , and κ5 ≡ σ TA5 /aˆ s,t = 3 κ6 ≡ σ TA6 /aˆ s,t = 5. Now it would be possible to update Aˆ 5 and Aˆ 6 using Aˆ 5 ← Aˆ 5 + κ5 (es − Aˆ t ) Aˆ 6 ← Aˆ 6 + κ6 (es − Aˆ t ), although this is not required by the steepest-edge rule. Now let us examine the update formula for the squares of the norms of these vectors. Initially γ4 = 17, γ5 = 19, and γ6 = 350. We compute

 B

−T

Aˆ t = B

−T

Aˆ 4 =

4 −8 17

 .

Then γ¯5 = γ5 + κ52 (1 + γ4 ) − 2κ5 AT5 (B −TAˆ 4 ) = 91 γ¯6 = γ6 + κ62 (1 + γ4 ) − 2κ6 AT6 (B −TAˆ 4 ) = 70, and these are the squares of the norms of the vectors in p. ¯ The steepest-edge rule can dramatically decrease the overall number of simplex iterations required to solve a linear program. It is especially valuable within the dual simplex method since in that setting a separate calculation is not required to obtain the vector σ . For further details, see the paper by Forrest and Goldfarb (1992). There are other pricing rules that attempt to choose a better entering variable than given by the steepest-descent rule. One of these, called Devex, only approximates the norms that are computed exactly by the steepest-edge rule. The costs per simplex iteration are lower, but more iterations are typically required. For further information on the Devex and other approximate forms of steepest-edge pricing, see the papers by Harris (1973), Goldfarb and ´ Reid (1977), and Swietanowski (1998). Currently, steepest-edge pricing is considered to be a good choice for the dual simplex method, whereas for the primal simplex method it is preferable to start with partial pricing and later switch to Devex or some other form of approximate steepest-edge pricing.

7.6.2 The Initial Basis Many software packages can take advantage of a specified initial basis, that is, if the user is able to provide one. More commonly, the package will have to determine an initial basis

i

i i

i

i

i

i

7.6. Numerical Stability and Computational Efficiency

book 2008/10/23 page 265 i

265

automatically. The simplex method can be initialized with a basis consisting of slack and/or artificial variables. However, if the model is feasible, the optimal basis need not contain any artificial variables. Also, if a slack variable is in the optimal basis, then the corresponding constraint is redundant. Hence an initial basis consisting of artificial and slack variables might have little in common with the optimal basis, and the simplex algorithm would then have to perform a great many pivots before reaching the optimal solution. For these reasons, some packages attempt to find an initial basis that avoids using artificial variables and (to a lesser extent) slack variables. This operation is sometimes referred to as a crash procedure. One such strategy is described in the paper by Bixby (1993). Crash procedures attempt to choose an initial basis B according to criteria such as (a) the columns of B do not correspond to artificial variables, (b) the columns of B are sparse, (c) the columns of B form an (approximately) upper or lower triangular matrix, (d) the diagonal entries of B are suitable pivot entries for Gaussian elimination, (e) the matrix B is not “too ill conditioned,” and (f) the columns of B are “likely” to be in the optimal basis. A crash procedure can reduce the number of simplex iterations required to find an optimal solution. However, the initial basis that results will be less sparse than for a slack/artificial basis (where B = I ) so the early simplex iterations will be more expensive, and the resulting savings in computer time may not be as dramatic.

7.6.3 Tolerances; Degeneracy Ideally, linear programming software would return a solution that exactly satisfied the constraints, all of whose variables were nonnegative, and where all the optimality conditions were satisfied. Unfortunately, due to the realities of finite-precision arithmetic, this is not always possible. Instead, the computed solution will only satisfy these conditions to within certain tolerances related to machine epsilon mach (the accuracy of the computer arithmetic; see Appendix B.2). The tolerances indicated below are based on a value of mach ≈ 10−16 . Many software packages allow the user to modify the tolerances used by the algorithm. Not all of these conditions are equally difficult to satisfy. If xB is computed using an LU factorization of B with partial pivoting, then BxB − b = O(mach ). B · xB  This indicates that (under these assumptions) the constraints Ax = b will be satisfied to near the limits of machine accuracy. These assumptions are not fully satisfied in linear programming software, however. The pivoting strategy may be modified to enhance sparsity of the factorization, and updates to the factorization can lead to additional deterioration. In fact, if BxB − b (scaled as above) becomes “too large” (larger than 10−6 , say), then this is an indication that it is time to refactor the basis matrix. Also, it is common to refactor the basis matrix at the optimal point to enhance the accuracy of the computed solution. The computed solution may violate the nonnegativity constraints x ≥ 0 (primal feasibility) or the optimality conditions (dual feasibility), but only by a small amount. For example, violations in these conditions of up to 10−6 might be tolerated. In addition, small coefficients in the model might be ignored. For example, any entry in A satisfying (say) |Ai,j | ≤ 10−12 might be replaced by zero.

i

i i

i

i

i

i

266

book 2008/10/23 page 266 i

Chapter 7. Enhancements of the Simplex Method

These tolerances for zero can be exploited as a technique for resolving degeneracy. Suppose that at some iteration of the simplex method the step procedure resulted in a step of zero. Then the feasibility tolerance for the corresponding basic variable could be randomly perturbed. The simplex algorithm would allow this variable to become slightly negative, and a nonzero step would be taken. The perturbed problem would not be degenerate. Similar perturbations could be incorporated whenever a degeneracy was detected. Later, when the solution to the perturbed problem had been found, the perturbations would be removed. The current basis might then be infeasible, and additional calculations would be required to restore feasibility with respect to the original problem. These further calculations would correspond to a phase-1 problem. It is common to encounter degeneracy when solving large practical linear programming problems. Strategies such as these are important enhancements to software for the simplex method. The tolerances can be used in a similar manner within the ratio test to expand the list of potential leaving variables. This can be of value in controlling ill-conditioning in the basis matrix, since leaving variables associated with small pivot entries can perhaps be avoided. For further details, see the paper by Bixby (1993).

7.6.4

Scaling

It is possible to make a problem ill conditioned merely by changing the units in which the model is specified. For example, consider the constraints      x1 3 1 5 . = 1 3 9 x2 The matrix has condition number equal to 2. Suppose that the first constraint measures kilograms of flour, say. If this first constraint is changed so that it measures grams of flour, then the system of constraints becomes      x1 3000 1000 5000 , = 1 3 9 x2 and the condition number of the transformed matrix is approximately 1250, which is about 1000 times worse than before. A similar situation would occur if the variable x1 had its units changed via a change of variables of the form xˆ1 = 1000x1 , causing a column of the matrix (as well as the cost coefficient c1 ) to be modified. Transformations such as these are cosmetic changes to the model and lead to new models that are mathematically equivalent to the originals. However, on a computer where finite-precision arithmetic is used, they can alter the behavior of the simplex method and lead to a deterioration in performance. Scaling problems can also arise if the model includes a large upper bound for a variable that need not have an upper bound. For example, the model might replace the constraint 0 ≤ x5 with 0 ≤ x5 ≤ 1012 ,

i

i i

i

i

i

i

7.6. Numerical Stability and Computational Efficiency

book 2008/10/23 page 267 i

267

where the value 1012 is out of scale with the remaining data in the model. This can cause difficulties if at some iteration the variable is set equal to its upper bound. It is not uncommon to encounter such “poorly scaled” problems. Large models are developed over a long period of time, often by a changing team of people, making it difficult to ensure that all the constraints are measured in consistent units. Or perhaps data might be collected from a variety of agencies whose reporting schemes did not conform to any common standard. Linear programming software attempts to cope with such difficulties by scaling of the variables and constraints. (In some codes this is done by default; in others it is optional.) A simple scaling rule divides the ith constraint (including the right-hand side) by max |ai,j | j

ˆ Then the j th column of Aˆ and the cost coefficient cj are divided by to obtain A. max |aˆ i,j | i

¯ Then the simplex method is applied to the transformed problem. If this scaling to obtain A. is used, then the largest entry (in absolute value) in any nonzero row or column of A¯ is equal to 1 (see the Exercises). This scaling strategy is heuristic in the sense that it is not guaranteed to improve the performance or accuracy of the simplex method. Ideally the scaling would be chosen so as to minimize, or at least reduce, the condition numbers of the basis matrices B. Such a strategy is not practical, even for finding an ideal strategy for a single basis, let alone a set of bases. For more information on scaling, see the paper by Skeel (1979).

7.6.5

Preprocessing

Since large models are often created by teams of people or automatically by software, it is common for these models to contain redundancies. These redundancies are generally harmless, so there is little motivation for the creator of the model to examine a model in detail in an attempt to eliminate them. Even though they are harmless, these redundancies do increase the size of a model, and this can lead to computational inefficiencies. Some software packages attempt to eliminate redundancies by preprocessing the model before applying the simplex method. We will list some of these techniques here. Further ideas can be found in the papers by Lustig, Marsten, and Shanno (1994); Brearly, Mitra, and Williams (1975); and Andersen and Andersen (1995). If all the entries in a row of A are equal to zero, then either the constraint is redundant (if the right-hand side is zero) and the constraint can be deleted, or it is inconsistent and the problem is infeasible. A similar technique can be applied if a column of A is zero, in which case the dual problem might be infeasible. A row of the matrix might represent a simple bound on a variable that had been written as a general constraint. It is better to handle such a constraint explicitly as a bound (see Section 7.2).

i

i i

i

i

i

i

268

book 2008/10/23 page 268 i

Chapter 7. Enhancements of the Simplex Method

The upper and lower bounds on a variable might be equal (see Section 7.6.6), for example, 3 ≤ x5 ≤ 3. Then 3 could be substituted for x5 throughout the model, and x5 eliminated. A more sophisticated technique uses the bounds on a variable to identify redundant constraints. For example, suppose the model contained the constraints x1 + x2 ≤ 20 0 ≤ x1 ≤ 10 0 ≤ x2 ≤ 5. Then the first constraint could be removed from the model since the upper bounds on the variables indicate that x1 + x2 ≤ 15. These rules could be applied repeatedly to a model since one set of reductions might reveal new possibilities. Once this process had stabilized, the simplex method would be applied to the reduced problem. Then, after the solution had been found, the transformations would be reversed to find the solution to the original problem.

7.6.6

Model Formats

We have assumed that the linear program being solved is in standard form: minimize

z = cTx

subject to

Ax = b x ≥ 0.

We have discussed how to convert any linear program into standard form, so this is not a restrictive assumption, but it can increase the size of a model unnecessarily. Linear programming software usually allows more general models, such as

or even

minimize

z = cTx

subject to

Ax = b  ≤ x ≤ u,

minimize

z = cTx

b1 ≤ Ax ≤ b2  ≤ x ≤ u, where b1 , b2 , , and u are (possibly infinite) upper and lower bounds on the constraints and the variables. Models of these types can be solved using straightforward variants of the simplex method (see Section 7.2). This flexibility permits models that might seem eccentric or even perverse. For example, it would allow a free constraint: subject to

−∞ ≤ 7x1 + 9x2 ≤ +∞. This might arise if a user was interested in solving a linear program, and then knowing the values of alternate objective functions at the optimal point x∗ . Each of these objective functions could be included in the original model as a free constraint.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 269 i

269

It would allow a fixed variable: 1 ≤ x3 ≤ 1. This might arise if a general, open-ended model were being developed for a company, but currently there was no flexibility for certain terms in the model. It would also allow a free variable: −∞ ≤ x4 ≤ ∞, a variable that can take on any value. All of these cases can be handled by the simplex method. A free constraint is always satisfied, so it can be ignored until the problem is solved and the solution is presented to the user. Fixed variables are just constants in the model. Free variables could be handled by the software in several ways. One way would be to eliminate them from the problem. For example, if x4 appeared in the constraint 5x4 + x5 − 3x6 = 2, then the equivalent formula x4 = 15 (2 − x5 + 3x6 ) could be substituted for x4 everywhere in the model. However, this approach can destroy some of the sparsity in the model. Instead, it may be preferable to retain x4 in the model and add it to the basis as soon as possible. Once a free variable enters the basis it will never leave the basis, since a change in the value of the entering variable will not cause the free variable to violate a bound. The only way that a free variable will not be part of the optimal basis is if its reduced cost is zero at every iteration.

Exercises 6.1. Let  A=

1 0 0

3 2 0

2 5 3

5 1 5

8 4 2

7 6 1

 .

Suppose that the current basis uses the basic variables xB = (x1 , x2 , x3 )T and the new basis x¯B = (x1 , x2 , x6 )T. Use the formulas for the steepest-edge pricing scheme to compute the updated vector γ¯ corresponding to columns 4 and 5 of A. 6.2. In a linear program, suppose that the j th variable is transformed via xj = θxj , where θ > 0. Is the steepest-edge pricing rule affected by this change? Explain your answer. 6.3. The discussion of the steepest-edge pricing rule did not derive the formulas corresponding to the leaving variable. Using the notation of Section 7.6.1, show that B¯ −1 As = es + (1/aˆ s,t )(es − Aˆ t ) = (1 + 1/aˆ s,t )es − (1/aˆ s,t )Aˆ t

i

i i

i

i

i

i

270

book 2008/10/23 page 270 i

Chapter 7. Enhancements of the Simplex Method and 2 )(1 + γt ) − 1. γ¯s = (1/aˆ s,t

Verify your result using the data in Example 7.13. 6.4. Another possible pricing scheme would be to determine, for each potential entering variable, what the new value of the objective function would be if that variable were to enter the basis. Why would this scheme be expensive within the simplex method? 6.5. Suppose that the scaling strategy in Section 7.6.4 is applied to an m × n matrix A ¯ Assume that no row or column of A has all its entries to obtain a scaled matrix A. equal to zero. Prove that max |a¯ i,j | = 1

for 1 ≤ j ≤ n,

max |a¯ i,j | = 1

for 1 ≤ i ≤ m.

i

j

7.7

Notes

Product Form—The product form of the inverse was developed by Dantzig and OrchardHays (1954). Column Generation—The technique of column generation is described in the papers of Eisemann (1957), Ford and Fulkerson (1958), and Manne (1958). The cutting stock problem is discussed in the papers of Gilmore and Gomory (1961, 1963, 1965). The knapsack problem is discussed in the book by Nemhauser and Wolsey (1988, reprinted 1999). Decomposition—The decomposition principle is due to Dantzig and Wolfe (1960). The implications for parallel computing are discussed in the paper by Ho, Lee, and Sundarraj (1988). In our description of the decomposition principle, a point x is represented as a convex combination of all the extreme points for the set described by the easy constraints. In cases such as our example, where these constraints can be decomposed into independent subproblems, the convex combinations can also be decomposed, and this can lead to computational efficiencies; see the paper by Jones et al. (1993). Numerical Stability and Computational Efficiency—In addition to the references cited in this section, general discussions of computational issues for the simplex method can be found in the books by Nazareth (1987) and Vanderbei (2007).

i

i i

i

i

i

i

book 2008/10/23 page 271 i

Chapter 8

Network Problems

8.1

Introduction

Linear programming problems defined on networks have many special properties. These properties allow the simplex method to be implemented more efficiently, making it possible to solve large problems efficiently. The structure of a basis, as well as the steps in the simplex method, can be interpreted directly in terms of the network, providing further insight into the workings of the simplex method. These relationships between the simplex method and the network form one of the major themes of this chapter. We use them to derive the network simplex method, a refinement of the simplex method specific to network problems. Network problems arise in many settings. The network might be a physical network, such as a road system or a network of telephone lines. Or the network might only be a modeling tool, perhaps reflecting the time restrictions in scheduling a complicated construction project. A number of these applications are discussed in Section 8.2.

8.2

Basic Concepts and Examples

The most general network optimization problem that we treat in this chapter is called the minimum cost network flow problem. It is a linear program of the form minimize

z = cTx

subject to

Ax = b  ≤ x ≤ u,

where  and u are vectors of lower and upper bounds on x. We allow components of  and u to take on the values −∞ and +∞, respectively, to indicate that a variable can be arbitrarily small or large. The notation for describing network problems is slightly different than for the linear programs we have discussed so far. Consider the network in Figure 8.1. You might think of this as a set of roads through a park. This network has seven nodes (the small black circles) and eleven arcs connecting the nodes. The nodes are numbered 1–7. An arc between nodes i and j is denoted as (i, j ). So, for example, this network includes the arcs (1, 2) and (4, 5). 271

i

i i

i

i

i

i

272

book 2008/10/23 page 272 i

Chapter 8. Network Problems 8 4

4

9

6

-20

2

12

11

1

7

50

8

5

15 6

3

3

7 -30

5

Figure 8.1. Sample network. In this example, the existence of an arc (i, j ) means that it is possible to drive from node i to node j , but not from node j to node i. There is a difference between arc (i, j ) and arc (j, i). For each arc (i, j ) the linear program will have a corresponding variable xi,j and cost coefficient ci,j . The variable xi,j records the flow in arc (i, j ) of the network, and for this application it might represent the number of cars on a road. In this problem there are eleven variables, one for each road. (The remaining information on the network is explained in Example 8.1.) In the general network problem there will be a variable for each arc in the network, and an equality constraint for each node. We assume that there are m nodes and n arcs in the network, so that A is an m × n matrix.7 The bounds on the variables represent the upper and lower limits on flow on an arc. Often the lower bound will be zero. The ith row of the constraint matrix A corresponds to a constraint at the ith node: (flow out of node i) − (flow into node i) = bi , or in algebraic terms

j

xi,j −



xk,i = bi ,

k

where the respective summations are taken over all arcs leading out of and into node i. If bi > 0, then node i is called a source since it adds flow to the network. If bi < 0, then the node is called a sink since it removes flow from the network. If bi = 0, then the node is called a transshipment node, a node where flow is conserved. A component ci,j of the cost vector c records the cost of shipping one unit of flow over arc (i, j ). Example 8.1 (Network Linear Program). Consider the network in Figure 8.1. We now use it to represent the flow of oil through pipes. Suppose that 50 barrels of oil are being produced at node 1, and that they must be shipped through a system of pipes to nodes 6 and 7 (20 barrels to node 6, and 30 barrels to node 7). The costs of pumping a barrel of oil along each arc are marked on the figure. The flow on each arc has a lower bound of zero and an upper bound of 30. Node 1 is a source and nodes 6 and 7 are sinks. The other nodes are transshipment nodes. The cost of each arc is marked in the figure. The corresponding minimum cost linear 7 This reverses the more common usage of n for the number of nodes and m for the number of arcs that is used in many references on network problems. This choice, however, provides consistency with the other chapters in this book, where n refers to the number of variables and m refers to the number of constraints.

i

i i

i

i

i

i

8.2. Basic Concepts and Examples

book 2008/10/23 page 273 i

273

program is minimize subject to

z = 12x1,2 + 15x1,3 + 9x2,4 + 8x2,6 + 7x3,4 + 6x3,5 + 8x4,5 + 4x4,6 + 5x5,6 + 3x5,7 + 11x6,7 x1,2 + x1,3 = 50 x2,4 + x2,6 − x1,2 = 0 x3,4 + x3,5 − x1,3 = 0 x4,5 + x4,6 − x2,4 − x3,4 = 0 x5,6 + x5,7 − x3,5 − x4,5 = 0 x6,7 − x2,6 − x4,6 − x5,6 = −20 −x5,7 − x6,7 = −30 0 ≤ x ≤ 30.

The constraints are listed in order of node number, where the left-hand side of the constraint corresponds to (flow out) − (flow in). If we order the variables as in the objective function, then in matrix-vector form the linear program could be written with cost vector c = ( 12

15

9

8

7

6

8

4

b = ( 50

0

0

0

0

−20

5

3

11 )T ,

right-hand side vector

and coefficient matrix ⎛ 1 1 ⎜ −1 ⎜ −1 ⎜ ⎜ A=⎜ ⎜ ⎜ ⎝

−30 )T , ⎞

1

1 1 −1

−1 −1

1 −1

1 −1

1 −1

1 −1

1 −1

1 −1

⎟ ⎟ ⎟ ⎟ ⎟. ⎟ ⎟ ⎠

Each column of A has two nonzero entries, +1 and −1. Each column corresponds to an arc (i, j ): +1 appears in row i and −1 in row j to indicate that the arc carries flow out of node i and into node j . The total supply in the network is given by the formula

bi S≡ { i:bi >0 }

and the total demand by D≡−



bi .

{ i:bi D, that is, there is excess supply, then an artificial node is added to the network with demand S − D, and artificial arcs are added, connecting

i

i i

i

i

i

i

274

book 2008/10/23 page 274 i

Chapter 8. Network Problems 20

1

3

20

1

3

-60

-40 5

5 2

2 25

25

4

4

Figure 8.2. Unbalanced networks.

20

1

3

20

1

3

-60

-40 5

5 2

2 25

25

4

4 6 -5

6 15

Figure 8.3. Transformed networks. every source to this artificial node; each such arc has its associated cost coefficient equal to zero. (This assumes that there is no cost associated with excess production.) If there is excess demand, then an artificial node is added with supply D − S, together with artificial arcs connecting this artificial node with every sink. These new arcs have cost coefficients that correspond to the cost (if any) of unmet demand. Example 8.2 (Ensuring that Total Supply Equals Total Demand). Consider the networks in Figure 8.2. The first has excess supply and the second has excess demand. If artificial sources and sinks are added appropriately, together with the associated artificial arcs, then the networks are brought into balance. The results of these transformations are illustrated in Figure 8.3. No cost has been associated with either excess supply or excess demand. We have written above that there are lower and upper bounds on every flow:  ≤ x ≤ u. For the sake of simplicity, when deriving the network simplex method in this chapter we will assume that the variables are only constrained to be nonnegative: x ≥ 0. This simplifying assumption can be made without any loss of generality. (The reasons for this are outlined here, although their justification is left to the Exercises.) A simple change of variables can be used to transform  ≤ x into 0 ≤ x. ˆ Upper bounds can also be eliminated.

i

i i

i

i

i

i

8.2. Basic Concepts and Examples

book 2008/10/23 page 275 i

275

The technique used to eliminate upper bounds does increase the size of the linear program, which can lead to an increase in solution time. An alternative is to develop a variant of the network simplex method that handles upper bounds, analogous to the bounded-variable simplex method developed in Section 7.2. The constraint matrix A in a network problem is sparse. As observed in Example 8.1, each column of A has precisely two nonzero entries, +1 and −1. If (i, j ) is an arc in the network, then the corresponding column in A has +1 in row i and −1 in row j . This implies that if all the rows of A are added together, then the result is a vector of all zeroes. Thus, the rank of A is at most m − 1, where m is the number of nodes in the network. We prove in the next section that the rank of A is exactly m − 1. If we add together all the rows in the equality constraints Ax = b, then, by the above remarks, the left-hand side will be zero. The right-hand side will sum to S −D (supply minus demand), and so it also will be zero. Therefore, any one of the constraints is redundant. The rank deficiency in A does not lead to an inconsistent system of linear equations. There are a number of special forms of the minimum cost network flow problem that are of independent interest. Special-purpose algorithms have been developed for these problems, some of which are dramatically more efficient than the general-purpose simplex method. For this reason, giving them individualized treatment has resulted in many practical benefits. We will not discuss these special-purpose algorithms in this book, but we mention some of these special problems to give some idea of the range of applications of network models. In a transportation problem, every node in the network is either a source or a sink, and every arc goes from a source node to a sink node. Hence the flow conservation constraints have one of two forms:

xi,j = bi j

for a source with bi > 0, or −



xk,i = bi

k

for a sink with bi < 0. A transportation problem models the direct movement of goods from suppliers to customers, where some cost is associated with the shipments. Example 8.3 (Transportation Problem). Suppose that a toy company imports dolls manufactured in Asia. Ships carrying the dolls arrive in either San Francisco or Los Angeles, and then the dolls are transported by truck to distribution centers in Chicago, New York, and Miami. We assume that the costs of the truck shipments are roughly proportional to the distances traveled. The corresponding transportation problem is given in Figure 8.4, with supplies and demands marked. Note that total supply equals total demand. An assignment problem is an optimization model for assigning people to jobs. Everyone must be assigned a job, and only one person can fill each job. It is a special case of a transportation problem, where bi = 1 for a source and bi = −1 for a sink. There are the same number of sources as sinks, because there are the same number of people as jobs. An assignment problem is frequently written as a maximization problem with the objective coefficients ci,j indicating the value of a person if assigned to a particular job

i

i i

i

i

i

i

276

book 2008/10/23 page 276 i

Chapter 8. Network Problems Chicago -5,000 0

150

San Francisco 2700

New York

10,000 -12,000 0 80

1

Los Angeles

3000

15,000

3200

2500

Miami -8,000

Figure 8.4. Transportation problem. (perhaps based on their experience or education, as well as the skill requirements of the job). If required, the assignment problem can be expressed as an equivalent minimization problem by multiplying the objective function by −1. Assignment problems suffer from severe degeneracy, but special algorithms have been designed to solve them that are more efficient than general algorithms for the transportation problem. It is not normally possible to assign a fraction of a person to a fraction of a job, so an assignment problem also includes the requirement that the variables take on integer values. This integrality constraint is common to many network problems. We show in the next section that, if the data for a network problem are integers, then any basic solution will be integer valued, and hence an optimal basic feasible solution will be integer valued. For this reason, we omit the integrality constraint from the model for an assignment problem. Example 8.4 (Assignment Problem). Suppose that a company is planning to assign three people to three jobs. The jobs are accountant, budget director, and personnel manager. The first two people have degrees in business, but the second has ten years of corporate experience, while the first is just out of school. The second and third persons both have some management experience, but in different departments. The third person’s degree was in anthropology. on this information, the personnel department has determined

Based numerical values ci,j corresponding to each person’s appropriateness for a particular job. The corresponding assignment problem is illustrated in Figure 8.5. The corresponding linear program can be written as maximize z = 11x1,1 + 5x1,2 + 2x1,3 + 15x2,1 + 12x2,2 + 8x2,3 + 3x3,1 + 1x3,2 + 10x3,3 subject to the constraints x1,1 + x1,2 + x1,3 = 1 x2,1 + x2,2 + x2,3 = 1

i

i i

i

i

i

i

8.2. Basic Concepts and Examples

book 2008/10/23 page 277 i

277

11 Person 1

Accountant 5 2 15 12

Person 2

Budget Director

8 3 1 Person 3

10

Personnel Manager

Figure 8.5. Assignment problem. x3,1 + x3,2 + x3,3 = 1 −x1,1 − x2,1 − x3,1 = −1 −x1,2 − x2,2 − x3,2 = −1 −x1,3 − x2,3 − x3,3 = −1 0 ≤ x ≤ 1. A shortest path problem determines the shortest or the fastest route between an origin and a destination. It can be represented as a minimum cost network flow problem with one source (the origin) with supply equal to 1, and one sink (the destination) with demand equal to 1. There

are usually many transshipment nodes where flow is conserved. The cost coefficients ci,j represent the length of an arc, the time required to traverse a particular arc, or the financial cost of using an arc. In many applications the cost coefficients satisfy ci,j ≥ 0. This is a natural requirement if ci,j represents the length of arc (i, j ) in the network. If this requirement is satisfied, then especially efficient algorithms are available to solve the shortest path problem. There exist applications, however, where it is sensible to allow ci,j < 0. If negative costs are present, the special-purpose algorithms can break down, and the shortest path problem can be more difficult to solve. Example 8.5 (Shortest Path Problem). The network in Figure 8.6 represents a road system. Some of the streets are one way, while others can be driven in both directions. The goal is to drive from the source (node 1) to the sink (node 11) via the shortest possible route. The travel times for each road segment are marked on the arcs. A maximum flow problem determines the maximum amount of flow that can be moved through a network from the source to the sink. As in the shortest path problem, there is a single source and a single sink. This problem includes an additional variable f that records the flow in the network. For convenience, assume that node 1 is the source and node m is the sink.

i

i i

i

i

i

i

278

book 2008/10/23 page 278 i

Chapter 8. Network Problems

source

1

16

8

9

12

7

9

9

11

6

6

5

7

2

11

4

5

10

10

8

13 15

6

5 12

8

11

5

11

3 sink 8

14

7

Figure 8.6. Shortest path problem. This problem is normally written in the form maximize x,f

subject to

z=f



x1,j − xk,1 = f j



xi,j −

k

j

xk,i = 0,



i = 2, . . . , m − 1

k

xm,j −

j

xk,m = −f

k

0 ≤ xi,j ≤ ui,j . (Note that f is a variable, even though it is written on the right-hand side of the constraints.) If the artificial arc (m, 1) is added to the network, with unlimited capacity (um,1 = +∞), then the maximum flow problem can be converted to an equivalent minimum cost network flow problem: minimize x

subject to

z = −xm,1



xi,j − xk,i = 0, j

i = 1, . . . , m

k

0 ≤ xi,j ≤ ui,j . The maximum flow problem is illustrated in the following example. Example 8.6 (Maximum Flow Problem). Suppose that you wish to transport a large number of military personnel between Seattle and New York by airplane. The network in Figure 8.7 indicates the available flights and the capacities (in hundreds) of the planes. The solution to the maximum flow problem determines the number of people that can be transported, as well as the routings that achieve this result.

i

i i

i

i

i 2008/1

page 27

i

i

8.2. Basic Concepts and Examples

279 15 Chicago 4

Seattle 12

1

21

Boston

25

8 6

source 10

sink

25

21 Columbus

7 7

11 8

2

5

15 15

Nashville

6

5

Denver

18 15

7 6

4 7

3

5

Charlotte

Albuquerque

Figure 8.7. Maximum flow problem. The dual of a maximum flow problem can be interpreted in terms of cuts. A cut is defined to be a division of the nodes into two disjoint sets, the first N1 containing the source, and the second N2 containing the sink. The capacity of the cut is the sum of the capacities of the arcs that lead from N1 to N2 . Example 8.7 (Cuts in a Network). Consider the maximum flow problem in Example 8.6. If we pick the cut defined by the node sets N1 = { 1, 2, 3 } and N2 = { 4, 5, 6, 7, 8 }, then the capacity of the cut is 5300 (the sum of the capacities of arcs (1, 4), (1, 8), (2, 4), (3, 4), (3, 5), and (3, 7)). If we pick the cut defined by the sets N1 = { 1, 4, 5, 7 } and N2 = { 2, 3, 6, 8 }, then the capacity of the cut is 9100 (for arcs (1, 2), (1, 3), (1, 8), (4, 2), (4, 6), (7, 6), and (7, 8)). A famous theorem states that the value of the maximum flow in a network is equal to the minimum of the capacities of all cuts in the network, a result that we will sketch here. This is a special case of the strong duality theorem for linear programming. For complete details, see the book by Ford and Fulkerson (1962). The dual of the original form of the maximum flow problem is  minimize w = ui,j vi,j y,v

subject to

y m − y1 = 1 yi − yj + vi,j ≥ 0 for all arcs (i, j ) vi,j ≥ 0.

The dual variable yi corresponds to the flow-conservation constraint for the ith node in the primal. The dual variable vi,j corresponds to the upper bound xi,j ≤ ui,j in the primal. To show the relationship of the dual problem with cuts, let yi = 0 if node i is in the set N1 , and let yi = 1 if node i is in the set N2 . This ensures that ym − y1 = 1. Let vi,j = 1 if arc (i, j ) connects N1 with N2 , and let vi,j = 0 otherwise. It is straightforward to check that this produces a feasible solution to the dual, and that the dual objective value is equal to the capacity of the cut. The fact that the optimal solution to the dual corresponds to a cut is left to the Exercises.

i

i i

i

i

i

i

280

book 2008/10/23 page 280 i

Chapter 8. Network Problems

Exercises 2.1. Write down the linear program for the transportation problem in Example 8.3. 2.2. Write down the linear program for the shortest path problem in Example 8.5. 2.3. Consider a network linear program where the variables have general lower bounds  ≤ x. Show how to use a change of variables to convert to a problem with nonnegativity constraints 0 ≤ x. ˆ 2.4. Consider a network linear program that includes upper bounds on the variables 0 ≤ x ≤ u. Show, by adding an artificial node for every upper bound, how to convert to an equivalent network problem without upper bounds on the variables. 2.5. Use the technique of the previous problem to remove the upper bounds in the linear program in Example 8.1. 2.6. Consider an arbitrary minimum cost network flow problem with lower bounds  = 0. Show that a feasible point for this problem can be found by solving a related maximum flow problem. Hint: Add a new “super source” to the network that can supply all the given sources, and a new “super sink” that can absorb the demand of all the given sinks. 2.7. Verify that the rank of the matrix A in Example 8.1 is equal to 6, one less than the number of equality constraints. 2.8. Solve the linear program in Example 8.4 (either by using simplex software or by examining the network in Figure 8.5) and verify that there is an integer-valued optimal basic feasible solution. 2.9. Show (by constructing an example) that the objective value in a shortest path problem with negative cost coefficients can be unbounded below. 2.10. Consider the maximum flow problem in Example 8.6. (i) Write down the linear program for this problem. (ii) What is the dual of this linear program? (iii) What is the capacity of the cut corresponding to the sets N1 = { 1, 3, 5, 6 } and N2 = { 2, 4, 7, 8 }? (iv) What is the dual feasible solution corresponding to this cut? 2.11. Consider a maximum flow problem and its dual, with N1 and N2 being the sets associated with a cut. Let yi = 0 if node i is in N1 , and let yi = 1 if node i is in N2 . Let vi,j = 1 if arc (i, j ) connects N1 with N2 , and let vi,j = 0 otherwise. Verify that y and v are feasible for the dual. 2.12. Use duality results from linear programming to prove that an optimal basic feasible solution to a maximum flow problem corresponds to a minimum capacity cut.

8.3

Representation of the Basis

Many of the efficiencies in the network simplex method come about because of the special form of the basis in a network problem. As we shall prove below, a basis is equivalent to a spanning tree, a special subset of a network that will be defined below. Before we can

i

i i

i

i

i

i

8.3. Representation of the Basis

book 2008/10/23 page 281 i

281

2

4

3

5

6

1

7

Figure 8.8. Sample network. 2

4

4

6

1

3

7 5

Figure 8.9. Subnetworks.

prove this important result, we shall need to define a number of terms relating to networks. The terms will be illustrated using the sample network in Figure 8.8. This same network was used in Example 8.1; the corresponding linear program will be referred to here also. A subnetwork of a network is a subset of the nodes and arcs of the original network. The arcs in the subnetwork must connect nodes in the subnetwork and must not involve nodes that are not in the subnetwork. For example, if the subnetwork includes only nodes 1, 3, and 6, then an arc (1, 2) could not be part of the subnetwork because node 2 is not part of the subnetwork; arc (6, 3) could be included if it was present in the original network. Subnetworks are illustrated in Figure 8.9. A subnetwork is itself a network. A path from node i1 to node ik is a subnetwork consisting of a sequence of nodes i1 , i2 , . . ., ik , together with a set of distinct arcs connecting each node in the sequence to the next. The arcs need not all point in the same direction. For example, the path could contain either arc (i1 , i2 ) or arc (i2 , i1 ). See Figure 8.10. A network is said to be connected if there is a path between every pair of nodes in the subnetwork. See Figure 8.11. A cycle is a path from a node i1 to itself. That is, it consists of a sequence of nodes i1 , i2 , . . ., ik = i1 , together with arcs connecting them. See Figure 8.12. A tree is a connected subnetwork containing no cycles. A spanning tree is a tree that includes every node in the network. A tree and spanning tree for the network in Figure 8.8 are shown in Figure 8.13. We will examine further the properties of trees and spanning trees. These are established in a sequence of lemmas. For the remainder of this chapter we make the following two assumptions about any network that we will consider: (a) the network is connected (if not, the problem can be decomposed into two or more smaller problems), and (b) there are no arcs of the form (i, i) from a node to itself. We are now ready to prove our results.

i

i i

i

i

i

i

282

book 2008/10/23 page 282 i

Chapter 8. Network Problems 1-2-4-3-5

7-6-4-5 2

4

4

3

5

5

6

1

7

Figure 8.10. Paths. 6

4

2

6

1

3

5

3

connected

5

not connected

Figure 8.11. Connected subnetworks. 6

4

3

5

2

4

3

5

6

1

7

Figure 8.12. Cycles. Lemma 8.8. Every tree consisting of at least two nodes has at least one end (a node that is incident to exactly one arc). Proof. Pick some node i in the tree. Follow any path away from node i (one must exist since the tree is connected). Since there are no cycles in the tree, eventually the path must terminate at an end of the tree.

i

i i

i

i

i

i

8.3. Representation of the Basis

book 2008/10/23 page 283 i

283

6

4

7 5

tree

2

4

3

5

6

1

7

spanning tree

Figure 8.13. Trees and spanning trees.

Lemma 8.9. A spanning tree for a network with m nodes contains exactly m − 1 arcs. Proof. This is proved by induction on the number of nodes in the spanning tree. If the spanning tree consists of one node, then there are no arcs. If the spanning tree consists of m ≥ 2 nodes, construct a subtree and subnetwork by removing an end node from the tree and the network, as well as the arc incident to it. Lemma 8.8 shows that such a node exists. The resulting tree has m − 1 nodes and (by induction) m − 2 arcs. Adding back the end node and the corresponding arc gives a spanning tree with m nodes and m − 1 arcs. Lemma 8.10. If a spanning tree is augmented by adding to it an additional arc of the network, then exactly one cycle is formed. Proof. Suppose that arc (i, j ) is added to the spanning tree. Since the spanning tree already contains a path between nodes i and j , that path together with the arc (i, j ) forms a cycle. So the augmented tree contains at least one cycle. Suppose that two distinct cycles were formed. They must both contain the new arc (i, j ) because the spanning tree had no cycles. Then the union of the two cycles, minus the new arc (i, j ), also contains a cycle, but consists only of arcs in the original tree. This is a contradiction, showing that exactly one cycle is formed. Lemma 8.11. Every connected network contains a spanning tree.

i

i i

i

i

i

i

284

book 2008/10/23 page 284 i

Chapter 8. Network Problems

Proof. If the network does not contain a cycle, then it is also a spanning tree since it is connected and contains all of the nodes. Otherwise, there exists a cycle. Deleting any arc from this cycle results in a subnetwork that is still connected. It is possible to continue deleting arcs in this way as long as the resulting subnetwork continues to contain a cycle. Ultimately a subnetwork is obtained that contains no cycle and is connected and contains all the nodes, that is, a spanning tree. The submatrix of A corresponding to a spanning tree has special structure: it can be rearranged to form a full-rank lower triangular matrix. Let B be the submatrix of A corresponding to a spanning tree. For the network in Figure 8.8, the matrix A was derived in Example 8.1: ⎛ ⎞ 1 1 1 1 ⎜ −1 ⎟ ⎜ ⎟ −1 1 1 ⎜ ⎟ ⎜ ⎟ A=⎜ −1 −1 1 1 ⎟. ⎜ ⎟ −1 −1 1 1 ⎜ ⎟ ⎝ ⎠ −1 −1 −1 1 −1 −1 For the spanning tree in Figure 8.13, the matrix B is obtained by selecting the columns associated with the variables x1,2 , x1,3 , x2,4 , x4,5 , x4,6 , and x6,7 : ⎛ ⎞ 1 1 1 ⎜ −1 ⎟ ⎜ ⎟ −1 ⎜ ⎟ ⎜ ⎟ B=⎜ −1 1 1 ⎟. ⎜ ⎟ −1 ⎜ ⎟ ⎝ ⎠ −1 1 −1 If the matrix B is rearranged so that the rows are listed in the order (3, 1, 2, 7, 5, 6, 4), and the columns in the order (2, 1, 3, 6, 4, 5), then B is transformed into ⎛ ⎞ −1 1 ⎜ 1 ⎟ ⎜ ⎟ −1 1 ⎜ ⎟ ⎜ ⎟ Bˆ = ⎜ −1 ⎟, ⎜ ⎟ −1 ⎜ ⎟ ⎝ ⎠ 1 −1 −1 1 1 a lower triangular matrix with entries ±1 along the diagonal. It is clear that the columns of B are linearly independent, and hence B is of full rank. The following lemma shows that this is always possible. Lemma 8.12. Let B be the submatrix of the constraint matrix A corresponding to a spanning tree with m nodes. Then B can be rearranged to form a full-rank lower triangular matrix of dimension m × (m − 1) with diagonal entries ±1.

i

i i

i

i

i

i

8.3. Representation of the Basis

book 2008/10/23 page 285 i

285

Proof. By Lemma 8.9, a spanning tree consists of m nodes and m − 1 arcs, so B is of dimension m × (m − 1). We will use induction to show that B can be rearranged into the required form. If m = 1, then B is empty. If m = 2, then the spanning tree consists of one arc so that either     −1 1 . or B = B= 1 −1 Both of these matrices are of the required form. Suppose that the result is true for spanning trees of m − 1 nodes. Now consider a spanning tree with m nodes, and let node i be an end of the spanning tree. By Lemma 8.8 such a node exists. Since node i is only connected to one arc in the tree, row i of B has exactly one nonzero entry, with value ±1. Suppose that this entry occurs in column j of B. Now interchange rows 1 and i of B, as well as columns 1 and j . Then B is transformed into   ±1 0 ˆ B= , v B1 where B1 is the submatrix corresponding to the spanning tree with node i and the corresponding arc removed, and v consists of the remaining portion of column j of B with row i removed. The matrix B1 represents a spanning tree for the network with node i removed, and hence (by induction) it can be rearranged into a lower triangular matrix with diagonal entries ±1. Hence Bˆ can also be rearranged into this form. Since all the diagonal entries of the rearranged matrix are nonzero, the matrix is full rank. We are now in a position to show the relationship between a spanning tree and a basis. To do this we state two definitions. Given a spanning tree for a network, a spanning tree solution x is a set of flow values that satisfy the flow-balance constraints Ax = b for the network, and for which xi,j = 0 for any arc (i, j ) that is not part of the spanning tree. A feasible spanning tree solution x is a spanning tree solution that satisfies the nonnegativity constraints x ≥ 0. These definitions are analogous to the definitions of basic solution and basic feasible solution. Recall from Section 4.3 that a point x is an extreme point for a linear program in standard form if and only if it is a basic feasible solution. Keep in mind, however, that in Chapter 4 we assumed that the constraint matrix A had full rank, whereas here one of the constraints is redundant. Hence the size of the basis will be m − 1, one less than the number of rows in A. Theorem 8.13 (Equivalence of Spanning Tree and Basis). A flow x is a basic feasible solution for the network flow constraints { x : Ax = b, x ≥ 0 } if and only if it is a feasible spanning tree solution. Proof. For the first half of the proof, let us assume that x corresponds to a feasible spanning tree solution. (That is, x is feasible, and the nonzero components of x together with, if

i

i i

i

i

i

i

286

book 2008/10/23 page 286 i

Chapter 8. Network Problems

necessary, a subset of the zero components of x are the variables for arcs that form a spanning tree.) Let B be the submatrix of A corresponding to the spanning tree. By the previous lemma the columns of B are linearly independent, and hence x is a basic feasible solution. For the other half of the proof, consider the set of arcs corresponding to the strictly positive components of x. If these arcs do not contain a cycle, then they can be augmented with zero-flow arcs to form a spanning tree, showing that x is a feasible spanning tree solution. Otherwise, this set of arcs must contain a cycle. We may assume that, within the cycle, all the flows are strictly greater than zero (if not, any arc with zero flow could be removed from the subnetwork associated with x). If the flow on an arc (i, j ) in the cycle is increased by some small  > 0, then the other flows in the cycle must be adjusted to maintain the flow-balance constraints. Any arc pointing in the same direction as arc (i, j ) has its flow increased by , and any arc pointing in the opposite direction has its flow decreased by . If  is sufficiently small, this can be done without violating the nonnegativity constraints. Call this new flow x . Similarly, if the flow on xi,j is decreased by , we can obtain a new feasible flow x− . Since x = 12 x + 12 x− the flow x is not an extreme point, and hence not a basic feasible solution. Together these remarks show that if x is a basic feasible solution, then x corresponds to a feasible spanning tree solution. If the right-hand-side entries { bi } for a network problem are all integers, then any basic feasible solution will also consist of integers. This is a consequence of the special form of the basis matrix B. Let B¯ be the matrix obtained by deleting the (dependent) last row of the lower triangular rearrangement of B. A basic feasible solution can be obtained by solving ¯ B = b, ¯ Bx where b¯ is the correspondingly rearranged right-hand-side b with its last component re−1 ¯ moved. This linear system can be solved using forward substitution: (xB )1 = B¯ 1,1 b1 , and for i = 2, . . . , m − 1,   i−1

−1 ¯ ¯ ¯ (xB )i = Bi,i bi − Bi,j (xB )j . j =1

Since B¯ i,i = ±1 for all i, and B¯ i,j = 0 or ±1, then xB must consist

of integers if b consists of integers. By similar reasoning, if the cost coefficients ci,j are all integers, then the dual variables must also be integers (see the Exercises). This property has important practical consequences. Linear programs in which the solutions are further constrained to take on integer values arise frequently. For example, it is difficult to build two-thirds of a warehouse or to send half of a soldier on a mission. Such problems are called integer programming problems. In general cases, they can be difficult to solve, requiring auxiliary search techniques beyond the simplex method, such as branch and bound or cutting plane methods (see the book by Nemhauser and Wolsey (1988, reprinted 1999)). For network problems, however, the basic feasible solutions will always

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 287 i

287

take on integer values, and hence an integer solution can be obtained just by applying the simplex method to the linear program arising from the network.

Exercises 3.1. For each of the example networks in Section 8.2, identify a spanning tree and compute the corresponding spanning tree solution. For the network in Figure 8.5, identify the basis matrix B and show that it can be rearranged as a lower triangular matrix. 3.2. Show how to compute the spanning tree solution corresponding to any spanning tree by first determining the flow at an end node of the tree, and then traversing the tree along paths beginning at the end node. Use this technique to prove that, if the supplies and demands for a network are integers, then any spanning tree solution will consist of integers.

3.3. Prove that, if the cost coefficients ci,j in a minimum cost network flow problem are all integers, then the simplex multipliers corresponding to any basic feasible solution must be integers. Hence prove that the values of the dual variables at an optimal basic feasible solution must also be integers. 3.4. Let A be the constraint matrix for a network linear program. Prove that the determinant of every square submatrix of A is equal to 0, 1, or −1. Such a matrix is called totally unimodular. (Hint: Use induction on the size of the square submatrix.) 3.5. Consider a linear program in standard form with constraint matrix A, right-hand-side vector b, and cost vector c. Assume that all the entries in A, b, and c are integers. Prove that if A is totally unimodular, then every basic feasible solution has integer entries. Hint: Use Cramer’s rule. 3.6. For a connected network, prove that any tree can be augmented with additional arcs to form a spanning tree. 3.7. Prove that a set of arcs in a network does not contain a cycle if and only if the corresponding submatrix of A has full column rank. 3.8. Use the result of the previous problem to prove that a basic feasible solution is equivalent to a feasible spanning tree solution.

8.4 The Network Simplex Method The network simplex method uses the same operations as the simplex method (see Section 5.2). The method takes advantage of the special form of the minimum cost network flow problem to reduce the operation count for the method, often performing the calculations directly on the network rather than using matrix operations. The exceptional efficiency of these operations has made the network simplex method an important tool for this special class of linear programming problems. We describe the network simplex method, showing how each of the major operations (the optimality test, the step, and the update) can be performed using network techniques.

i

i i

i

i

i

i

288

book 2008/10/23 page 288 i

Chapter 8. Network Problems 3 5

6

6

1 4

10

8

8

7

8 4

12

2 15

5

3

-25

8 9

2

7

5

Figure 8.14. A sample network. These operations will be related back to the formulas and algebraic techniques used in Chapter 5 to describe the simplex method. Before we present the network simplex method, we will review the steps in the simplex method. Let B be the basis matrix at a given iteration, and assume that it corresponds to a basic feasible solution satisfying BxB = b. Let Ai,j be the column of A associated with arc (i, j ). Then the steps of the simplex method (adapted to the notation for the network problem) are as follows: 1. The Optimality Test—Compute the vector of simplex multipliers by solving B Ty = cB . Compute the coefficients cˆi,j = ci,j − y TAi,j for the nonbasic variables xi,j . If cˆi,j ≥ 0 for all nonbasic variables, then the current basis is optimal. Otherwise, select a variable xs,t that satisfies cˆs,t < 0 as the entering variable. 2. The Step—Determine by how much the entering variable xs,t can be increased before one of the current basic variables is reduced to zero. If xs,t can be increased without bound, then the problem is unbounded. 3. The Update—Update the representation of the basis matrix B and the vector of basic variables xB . The simplifications in the method come about because of the special form of the basis matrix B (a lower triangular matrix with all entries equal to 0, 1, or −1) and its equivalent representation as a spanning tree. To describe the method, we will use as an example the network problem in Figure 8.14. Nodes 1 and 2 are sources (with supplies equal to 10 and 15, respectively) and node 8 is a sink (with demand equal to 25). The costs of the arcs are indicated on the network. We initialize the method with the basic feasible solution x1,3 = 10, x2,5 = 15,

x3,4 = 10, x5,6 = 15,

x4,6 = 10, x7,8 = 0.

x6,8 = 25

All other arcs are nonbasic, and the corresponding variables are zero. The value of the

i

i i

i

i

i

i

8.4. The Network Simplex Method

book 2008/10/23 page 289 i

289

objective function is z = 465. It is easy to check that this flow satisfies all the constraints for the network, and that it is a feasible spanning tree solution. To determine the simplex multipliers y we solve B Ty = cB . If xi,j is a basic variable, and (i, j ) is the corresponding arc in the network, then the corresponding equation for the simplex multipliers is yi − yj = ci,j . There is a simplex multiplier associated with every node in the network. As has been mentioned, the rows of the matrix B are linearly dependent. This implies that one of the simplex multipliers is arbitrary. To determine the simplex multipliers, we will traverse the spanning tree (basis) starting at an end and set the first of the simplex multipliers equal to zero. Hence for this basis, y1 y3 y4 y6 y8 y7 y5 y2

=0 = y1 − 5 = −5 = y3 − 4 = −9 = y4 − 7 = −16 = y6 − 8 = −24 = y8 + 3 = −21 = y6 + 5 = −11 = y5 + 2 = −9.

To determine the simplex multipliers we could have begun this process at any node. Also, we could have specified any value for the first simplex multiplier, not just zero. This would have resulted in different values for the simplex multipliers, but would not affect the optimality test, since this test only depends on the differences between pairs of simplex multipliers. To perform the optimality test we compute cˆi,j = ci,j − y TAi,j for the nonbasic variables xi,j . Because each column of A contains only two nonzero entries, +1 and −1, we obtain the formula cˆi,j = ci,j − yi + yj . If we carry out this calculation for all the nonbasic arcs, we get cˆ1,4 cˆ3,6 cˆ5,4 cˆ2,4 cˆ5,7

= 8 − y1 + y4 = 6 − y3 + y6 = 10 − y5 + y4 = 12 − y2 + y4 = 9 − y5 + y7

= −1 < 0 = −5 < 0 = 10 = 12 = −1 < 0.

Since some of these entries are negative, this basis is not optimal. The entry cˆ3,6 is the most negative, and we choose the variable x3,6 to enter the basis. By Lemma 8.10, adding this arc to the spanning tree creates a unique cycle, illustrated in

i

i i

i

i

i

i

290

book 2008/10/23 page 290 i

Chapter 8. Network Problems

3 10 x 1,3 =

x3

,6

6

1 x 3,4 =10

x6

,8

10 x 4,6 =

=25

8 x 7,8 =

5,

x

6

2

=1 5

4

x2 = ,5 1 5

0

7

5 Figure 8.15. Entering variable and cycle.

3 10 x 1,3 =

x3

,6

=10

6

1

x6

,8

0 x 4,6 =

=25

8 x 7,8 =

x2 = ,5 1 5

5,

x

6

2

=1 5

4

0

7

5 Figure 8.16. Result of iteration 1.

Figure 8.15. If x3,6 is increased from zero, then the flows in the other arcs in the cycle must be adjusted to maintain the flow-balance constraints in the linear program. In this case the flows in the other two arcs must decrease by one unit for every increase of one unit in x3,6 . In the current basis x3,4 = x4,6 = 15, so x3,6 can be increased until it is equal to 15, at which point the other two flows are both equal to zero. One of the two arcs must be chosen to leave the basis. We pick x3,4 to leave the basis. We obtain the new basic feasible solution shown in Figure 8.16.

i

i i

i

i

i

i

8.4. The Network Simplex Method

book 2008/10/23 page 291 i

291

3 10 x 1,3 =

x3

,6

=10

6

1

x6

,8

0 x 4,6 =

=10

8 4 x 7,8 =

2 x2 = ,5 1 5

15

7 15 x 5,7 =

5 Figure 8.17. Result of iteration 2. The new values of the basic variables are x1,3 = 10, x2,5 = 15,

x3,6 = 10, x5,6 = 15,

x4,6 = 0, x7,8 = 0,

x6,8 = 25

and the new value of the objective function is z = 415. Setting y1 = 0, the simplex multipliers are y = (0

−4

−5

−4

−6

−11

−16

−19 )T .

In the optimality test, cˆ5,7 = 9 − y5 + y7 = −1 < 0. Hence this basis is not optimal, and x5,7 is the entering variable. Adding arc (5, 7) to the spanning tree produces a unique cycle. To maintain the flow-balance constraints when x5,7 is increased by one unit, x7,8 will also increase by one unit, while x5,6 and x6,8 will both decrease by one unit. Since x5,6 = 15 and x6,8 = 25, x5,6 will go to zero first and hence will leave the basis. The new basic feasible solution is illustrated in Figure 8.17. The new values of the basic variables are x1,3 = 10, x2,5 = 15,

x3,6 = 10, x5,7 = 15,

x4,6 = 0, x7,8 = 15,

x6,8 = 10

and the new value of the objective function is z = 400. Computing the simplex multipliers gives y = (0

−5

−5

−4

−7

−11

−16

−19 )T .

i

i i

i

i

i

i

292

book 2008/10/23 page 292 i

Chapter 8. Network Problems

In the optimality test, cˆ1,4 = 4, cˆ3,4 = 5, cˆ2,4 = 13 cˆ5,4 = 11, cˆ5,6 = 1. Since these entries are all nonnegative, the current basis is optimal and the algorithm terminates. We now summarize the steps in the network simplex method. 1. The Optimality Test (i) Compute the simplex multipliers y: Start at an end of the spanning tree and set the associated simplex multiplier to zero. Following the arcs (i, j ) of the spanning tree, use the formula yi − yj = ci,j to compute the remaining simplex multipliers. (ii) Compute the reduced costs c: ˆ For each nonbasic arc (i, j ) compute cˆi,j = ci,j − yi + yj . If cˆi,j ≥ 0 for all nonbasic arcs, then the current basis is optimal. Otherwise, select an arc (s, t) that satisfies cˆs,t < 0 as the entering arc. 2. The Step—Identify the cycle formed by adding (s, t) to the spanning tree. Determine how much the flow on arc (s, t) can be increased before one of the other flows in the cycle is reduced to zero. If the flow in (s, t) can be increased without bound, then the problem is unbounded. 3. The Update—Update the spanning tree by adding arc (s, t) and removing an arc of the cycle whose flow has been reduced to zero. It remains to show how to obtain an initial basic feasible solution. In the example an initial basic feasible solution was provided, but in general cases a procedure for finding an initial point is required. The techniques for network problems are analogous to those used for general linear programs (see Section 5.5). In a network problem, artificial arcs (or, equivalently, artificial variables) can be added to the network in such a way that an “obvious” initial basic feasible solution is apparent. Then a phase-1 or big-M procedure is used to remove the artificial variables from the basis. One way of doing this is to pick one node in the network to be labeled the root node. Then artificial arcs are added: one from each source node to the root node, and one from the root node to each sink and transshipment node. (No arc need be added from the root node to itself.) The costs associated with these arcs would be equal to 1 in a phase-1 problem, and equal to M in a big-M problem. The initial basic feasible solution would transmit all flow from the sources to the sinks via the root node, with zero flow from the root node to a transshipment node. This technique is illustrated in Figure 8.18, where the original arcs in the network are marked with solid lines and the artificial arcs with dotted lines. The network simplex method performs the following arithmetic operations: computing y : computing cˆ : updating x :

m subtractions 2(n − m) subtractions m additions/subtractions

i

i i

i

i

i

i

8.4. The Network Simplex Method

book 2008/10/23 page 293 i

293

root

3

M

5

6

M

M

6

1 4

M

10

8

8

7

M

8 4

12 2 15

M

5

M

3

-25

8 9

2

7

5

Figure 8.18. Initial basic feasible solution. so that the total number of arithmetic operations is m + 2(n − m) + m = 2n additions/subtractions. All of these calculations involve integers if the vectors b and c consist of integers. We now compare this with the simplex method. The operation counts for the simplex method (see Sections 5.3 and 7.5) are harder to determine, since they depend on the sparsity of the constraint matrix A and the representation of the basis matrix B. We will assume that an LU factorization is used to represent B, and that the matrices A and B are sparse. An iteration of the simplex method involves the following steps: computing y : solving B Ty = cB computing cˆ : computing cj − y TAj for (n − m) values of j updating B : updating a sparse LU factorization. Each of these steps is more expensive than the corresponding step of the network simplex method. More operations are required, the operations involve multiplication and addition, and the operations involve real (decimal) numbers. The network simplex method involves fewer operations, and each of those operations is faster (addition is usually faster than multiplication, and integer operations are usually faster than real operations). As a result, network simplex software is much faster than general-purpose simplex software. In these operation counts we are ignoring the operations involved in maintaining the data structures for the algorithms. Much research has focused on ways of representing the network, as well as the spanning tree, within the network simplex algorithm. The data structure must allow all the simplex operations to be performed efficiently. It must also be designed so that it can be updated easily to reflect changes in the basis. For further details see the book by Ahuja, Magnanti, and Orlin (1993).

i

i i

i

i

i

i

294

book 2008/10/23 page 294 i

Chapter 8. Network Problems

Many of the topics that have been discussed in other chapters for the simplex method have analogs for the network simplex method. For example, it is possible to do sensitivity analysis, but in the network case all the calculations can be done more efficiently. Also, for degenerate problems, it is possible that the network simplex method could cycle, and so some sort of anticycling procedure may be necessary. Degeneracy in network problems is common. Even in cases where cycling does not occur, it is possible to have a large number of consecutive degenerate iterations. This is referred to as stalling. If the network simplex method is implemented with the basis represented and updated in a special way (using what is known as a “strongly feasible basis”), and if the entering variable is chosen appropriately, then at most nm consecutive degenerate iterations can occur. This approach guarantees that the network simplex method always terminates in a finite number of iterations, even on degenerate problems. It also improves the practical performance of the network simplex method. Details of this approach are discussed in Section 8.5.

Exercises 4.1. Apply the network simplex method to the linear programming problems in (i) (ii) (iii) (iv)

Example 8.1. Example 8.3. Example 8.4. Example 8.6.

4.2. In the network simplex method, let r be the node whose simplex multiplier is set to zero. An arc (i, j ) will be called a forward arc if the path from node r to node j along the spanning tree includes node i. Otherwise, arc (i, j ) will be a reverse arc. Define the cost of a path from node r to node i as the sum of the costs of the reverse arcs in the path minus the sum of the costs of the forward arcs. Prove that the simplex multiplier yi is equal to the cost of the path from node r to node i. 4.3. Consider the cycle created by adding a nonbasic arc (i, j ) to a spanning tree. Define the cost of the cycle as the sum of the costs of the arcs in the cycle whose direction is the same as arc (i, j ) minus the sum of the costs of the arcs whose direction is opposite to arc (i, j ). Prove that the cost of this cycle is equal to cˆi,j , the reduced cost for the nonbasic arc. 4.4. The network simplex method can be made more efficient by updating the simplex multipliers y at each iteration, rather than recomputing them. Prove that the new simplex multipliers y¯ satisfy either y¯i = yi or y¯i = yi − cˆj,k , where (j, k) is the entering arc. What is the rule for determining which formula to use to compute y¯i ? 4.5. Derive a variant of the network simplex method for upper bounded variables, analogous to the bounded-variable simplex method developed in Section 7.2. 4.6. Apply the initialization procedure in Figure 8.18 to the network problem in Figure 8.1. Use a phase-1 procedure to find an initial basic feasible solution to the original network.

i

i i

i

i

i

i

8.5. Resolving Degeneracy

book 2008/10/23 page 295 i

295

4.7. Suppose that a minimum cost network flow problem has been modified by adding additional linear constraints. Show how to use the decomposition principle to solve the resulting problem, with the flow-balance constraints considered as the “easy” constraints. 4.8. Apply the method of the previous exercise to the linear program obtained by adding the constraint x1,2 + x1,3 ≥ 6 to the network problem in Figure 8.14.

8.5

Resolving Degeneracy

As with the regular simplex method, it is possible to solve degenerate linear programming problems and avoid cycling by using an appropriate pivot rule. The approach we will use here is a variant of the perturbation method (see Section 5.5.1). For network problems, this method can be realized in a particularly efficient manner. Much of our discussion will be specific to networks, and only at the end will the connections with the perturbation method be made clear. The technique we describe uses a special form of basis, called a strongly feasible basis or strongly feasible tree. To define such a tree, we identify a particular node r as the root node. Then the tree is strongly feasible if any arc whose flow is zero points away from the root node r. (An arc (i, j ) points away from the root if the path from node j to node r along the tree includes node i.) Any tree whose flows are all positive is strongly feasible. Strongly feasible trees are illustrated in Figure 8.19. The following theorem shows that they can be used to guarantee termination of the simplex method. Theorem 8.14 (Guaranteed Termination). If the basis at every iteration of the network simplex method is a strongly feasible basis, then the simplex method will terminate in a finite number of iterations. Proof. We will prove that the simplex method cannot cycle. Since there are only finitely many possible bases, and no basis can repeat, this will guarantee finite termination. We

=

=

2 = 7 x 8, x8,6 = 2

4

8 = root

x 1,

4

1 = root

,8

=0 ,1

=2 ,3

x6

=0 ,4

x5 1

2

3

=0 x 7,4

7

7

x6,3 = 2

6

6

=1 x 2,5

5

5

=0 x 3,7

x2

3

=7 x 5,2

4

x5

4

x2

,1

=

3

2

4

Figure 8.19. Strongly feasible tree.

i

i i

i

i

i

i

296

book 2008/10/23 page 296 i

Chapter 8. Network Problems

denote by x and y the values of the variables at the current iteration, and by x¯ and y¯ the values at the next iteration. As a preliminary step in the proof, we derive an update formula for the simplex multipliers y. Let (s, t) be the entering arc at the current iteration of the simplex method. Consider the subnetwork obtained by deleting the leaving arc from the current tree. This subnetwork consists of two trees, Ts containing node s and Tt containing node t. The new simplex multipliers y¯ can be chosen as  yi if node i is in Ts ; y¯i = yi − cˆs,t if node i is in Tt . We must verify that y¯i − y¯j = ci,j for the new basis. If arc (i, j ) is in Ts or in Tt , then y¯i − y¯j = yi − yj = ci,j . To verify this for the entering arc (s, t) first recall that cˆs,t = cs,t − ys + yt . Then y¯s − y¯t = ys − (yt − cˆs,t ) = (cs,t + yt − cˆs,t ) − yt + cˆs,t = cs,t as desired. To prove that the simplex method does not cycle, we will show that “progress” is made at every iteration. Progress will be defined in terms of two functions: f1 (x) = cTx m

(yr − yi ), f2 (y) = i=1

where r is the root node of the strongly feasible tree. (Even though the simplex multipliers are not uniquely determined, their differences are unique, and so the function f2 is well defined.) At a nondegenerate iteration there is strict improvement in the objective function, so ¯ < f1 (x) f1 (x) and progress is made with respect to f1 . ¯ = f1 (x). The entering arc (s, t) will enter the basis At a degenerate iteration f1 (x) with flow equal to zero, and hence it must point away from the root (by the definition of a strongly feasible tree). This implies that node r is in the subnetwork Ts , and that ¯ = f2 (y) + cˆs,t |Tt |, f2 (y) where |Tt | is the number of nodes in Tt . Since cˆs,t < 0 and |Tt | > 0, ¯ < f2 (y), f2 (y)

i

i i

i

i

i

i

8.5. Resolving Degeneracy

book 2008/10/23 page 297 i

297

and so in this case progress is made with respect to f2 . Because progress is made with respect to one or the other of these functions at every iteration, a basis can never repeat and cycling cannot occur. If the network simplex method can be implemented so that at every iteration a strongly feasible basis is maintained, then it is guaranteed to terminate. The initialization scheme described in Section 8.4 produces an initial strongly feasible basis. (See the Exercises.) We now show that, if the leaving arc is chosen appropriately at every iteration, then every basis will be a strongly feasible basis. The rule for choosing the leaving arc will be based on the cycle created by the entering arc. If there is only one candidate for the leaving arc, then no choice is available. Otherwise, within this cycle define the join to be the node closest to the root of the tree, that is, the node whose path to the root consists of the fewest number of arcs. We will traverse the cycle, starting at the join, in the direction corresponding to the entering arc. (If (s, t) is the entering arc, this traversal will encounter node s just before node t.) The leaving arc will be chosen as the first candidate arc encountered during this traversal of the cycle. The following theorem shows that this rule has the desired property. Theorem 8.15. Assume that the network simplex method is initialized with a strongly feasible basis, and that at every iteration the leaving arc is chosen using the above rule. Then at every iteration the basis will be a strongly feasible basis. Proof. We need only prove that if the current basis is strongly feasible, then so is the new basis. There are two cases: nondegenerate and degenerate iterations. In both cases we need only examine the arcs in the cycle. For a nondegenerate iteration, all the candidate arcs must point in the opposite direction to the entering arc, since their flow will decrease towards zero. If the first arc encountered in traversing the cycle is selected as the leaving arc, then all the other candidate arcs will point away from the root in the new basis. Thus the new basis will be strongly feasible. For a degenerate iteration, all the arcs with zero flow will point away from the root, by the definition of a strongly feasible basis. As we traverse the cycle starting at the join, there will be no candidate arcs encountered until after we have traversed the entering arc. (The candidate arcs will all point in the opposite direction to the entering arc.) Hence the leaving arc will come after the entering arc, and once it is removed, all the arcs with zero flow in the new basis will point away from the root. This completes the proof. To conclude this section, we will show the relationship between strongly feasible bases and the perturbation method. This is the subject of the next theorem. Theorem 8.16. Consider a network linear program with equality constraints Ax = b and a perturbed problem with constraints Ax = b + , where  −(m − 1)/m if i = r; i = 1/m otherwise. Here m is the number of nodes in the network, r is the index of the root node, and i is the index of a general node. Assume that the original problem has integer data, and that

i

i i

i

i

i

i

298

book 2008/10/23 page 298 i

Chapter 8. Network Problems

a feasible spanning tree solution for this problem has been specified. Then the tree for the network is strongly feasible if and only if the corresponding flow is feasible for the perturbed problem. Proof. We will define subsets of the nodes of the network relative to the root of the tree. For a node i, d(i) will be the set of nodes whose paths to the root include node i. Let |d(i)| be the number of elements in d(i). Let x be the current basic feasible solution of the original problem, and let x¯ be the corresponding solution of the perturbed problem. If (i, j ) is a basic arc, we will show that  x¯i,j =

xi,j + |d(j )|/m xi,j − |d(i)|/m

if arc (i, j ) points away from node r, if arc (i, j ) points towards node r

satisfies the flow constraints for the perturbed problem. Suppose first that the arc (i, j ) points away from node r. At node j = r the perturbed flow-balance equation must be satisfied: x¯i,j +



x¯k,j −



k =i

x¯j, = bj + 1/m,



where these summations only include arcs that are in the tree. (Note that the nodes k and  satisfy k,  ∈ d(j ).) Substituting the proposed solution into the left-hand side gives x¯i,j +



x¯k,j −



k =i

x¯j,



= xi,j + |d(j )|/m +  = xi,j +

k =i

= bj + 1/m,



(xk,j − |d(k)|/m) −

k =i

xk,j −



 x,j

 + |d(j )| −



(x,j + |d()|/m)



k =i

|d(k)| −



 |d()|



so the general constraints in the perturbed problem are satisfied. A similar argument can be used when the arc (i, j ) points towards node r, as well as at the root node (see the Exercises). We now show that the perturbed solution is feasible if and only if the basis is strongly feasible. On the basic arcs, the perturbed solution differs from the original solution by ±|d(j )|/m, a value that is less than one in magnitude. For a problem with integer data, the only arcs that could become infeasible are those with zero flow in the original problem that point towards the root node. If the perturbed solution is feasible, then no such nodes can exist and so the basis is strongly feasible. Likewise, if the basis is strongly feasible, then there are no such nodes and the perturbed solution is feasible. In Chapter 5, perturbation was applied to general linear programs as a technique for resolving degeneracy. In that setting it was shown that perturbation could be implemented within the simplex method using a lexicographic technique. Here, in the context of network problems, we have shown how perturbation can be implemented using strongly feasible

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 299 i

299

trees. This establishes an additional relationship between the properties of networks and the algebraic properties of the simplex method.

Exercises 5.1. Prove that the initialization scheme in Figure 8.18 produces a strongly feasible basis. 5.2. Prove that exactly two smaller trees are formed when an arc is deleted from a tree. 5.3. Complete the proof of Theorem 8.16 by showing that the proposed perturbed solution satisfies the flow constraints (a) at the root node, and (b) at node i when the arc (i, j ) points towards the root node. 5.4. Solve the assignment problem in Example 8.4 with the perturbation method initialized using the technique in Figure 8.18. You may use either a big-M or a two-phase approach.

8.6

Notes

Network Models—Network models can sometimes be solved much faster than general linear programs. This can happen for one of two reasons: the problem might have a special structure that guarantees that the network simplex method will terminate in few iterations, or there might exist special algorithms for the problem. For example, the shortest path problem can be solved using an algorithm of Dijkstra (1959) that requires O(m2 ) operations. Fredman and Tarjan (1987) showed how to reduce this to O(n + m log m) by using appropriate data structures. There are other efficient algorithms with operation counts that depend on the magnitudes of the coefficients in the cost vector c. (In many applications, m  n  m(m − 1).) As with the shortest path problem, there are especially efficient algorithms for the maximum flow problem. Early results in this area can be found in the book of Ford and Fulkerson (1962). The first polynomial-time algorithm was described by Edmonds and Karp (1972), a method requiring O(mn2 ) operations. Cheriyan and Maheshwari (1989) √ have a method with an operation count of O(m2 n), and there are a number of efficient methods with operation counts that depend on the magnitudes of the upper bounds u. An important class of algorithms for this problem is described in the papers of Goldberg (1985) and Goldberg and Tarjan (1988). For further references, and for further information on algorithms for individual network problems, see the books by Murty (1992, reprinted 1998) and Ahuja, Magnanti, and Orlin (1993). Network Simplex Method—The network simplex method continues to be a competitive method for solving network optimization problems, and it has the advantage that it is available in high-quality software packages. However, many alternative algorithms have been proposed for these problems that (a) have better theoretical properties, (b) have promising practical properties, or (c) take advantage of the special form of a particular problem (such as a shortest path problem). The network simplex method requires few operations per iteration, but the number of iterations may be large. Technically, the number of iterations may be “exponential” in the

i

i i

i

i

i

i

300

book 2008/10/23 page 300 i

Chapter 8. Network Problems

size of the network. As a result, the total effort of solving the network problem can be large. It is desirable to have an algorithm that requires only a “polynomial” number of iterations.8 Some of these other algorithms are based on the simplex method. Before mentioning them, we should point out that the (primal) simplex method maintains primal feasibility (the constraints in the primal linear program are satisfied at every iteration) and complementary slackness, and it iterates until the dual feasibility (that is, primal optimality) conditions are satisfied. The “primal-dual” method is one of these simplex-based methods. It starts with a dual feasible solution and uses the complementary slackness conditions to construct a “restricted” version of the primal problem. This restricted primal problem is then solved. If the restricted primal problem has optimal objective value zero, then the original network problem has been solved. Otherwise, the solution of the restricted primal can be used to improve the values of the dual variables, or to determine that no solution exists. The primaldual method maintains dual feasibility and complementary slackness and strives for primal feasibility. The motivation for this method is that the restricted primal problem is a shortest path problem, for which special algorithms exist. For more information on the primal-dual method, see the book by Chvátal (1983). Early tests of the primal-dual simplex method showed that it could be more efficient than the primal simplex method, but these conclusions were reversed when better implementations of the primal simplex method became available. Also, the primal-dual simplex method may require an exponential number of iterations, and so its theoretical behavior is not superior either. It is also possible to apply the dual simplex method. In the version due to Orlin (1984), the dual simplex method requires only a polynomial number of iterations. (See also the paper by Orlin, Plotkin, and Tardos (1993).) Note, however, that not all versions of the dual simplex method may be polynomial-time methods. In fact, Zadeh (1979) has shown the equivalence of versions of the primal simplex method, the dual simplex method, the primaldual simplex method, and the out-of-kilter method (see below), and in an earlier paper (1973) described an example where all of these methods require an exponential number of iterations. There are a great many other network algorithms that are not based on the simplex method. One of the earliest, called the “out-of-kilter” algorithm, begins with an initial guess that satisfies the flow-balance constraints, but may violate the primal bound constraints as well as the dual feasibility constraints. It iterates, trying to find a point that satisfies the feasibility and optimality conditions, measuring progress in terms of a “kilter number” based on the optimality conditions for the problem. For further details, see the book by Ford and Fulkerson (1962). Much recent research is concerned with the development of efficient polynomial-time methods for network problems. The earliest of these methods (derived from the primaldual and out-of-kilter methods) had operation counts that depended on the magnitudes of the cost coefficients and upper bounds in the model. More recent work, starting with the paper by Tardos (1985), has developed “strongly” polynomial methods whose operation counts are independent of these magnitudes. For a survey of this work, see the book by Ahuja, Magnanti, and Orlin (1993). 8 The

terms “exponential” and “polynomial” are defined in Section 9.2.

i

i i

i

i

i

i

book 2008/10/23 page 301 i

Chapter 9

Computational Complexity of Linear Programming

9.1

Introduction

Almost as soon as it was developed, the simplex method was tested to determine how well it worked. Those early tests demonstrated that it was an effective method (at least on the examples it was applied to), and this conclusion was confirmed by numerous practical applications of the method to ever larger and more elaborate models. This encouraging empirical experience was not supported by comparable theoretical results about the behavior of the simplex method, despite considerable effort to find such results. This raised a number of questions. Is the simplex method guaranteed to work well on all nondegenerate problems? Are there classes of problems on which the simplex method performs poorly? Is the simplex method the most efficient method possible for linear programming? These questions were answered (at least partially) in the 1970s and 1980s. In this chapter we present a brief survey of these results. First, we discuss measures of performance of algorithms. Next we discuss the computational efficiency of the simplex method. We show that for some specially structured problems the number of iterations required by the simplex method grows exponentially with the size of the problem. Thus, measured by its worst-case performance, the simplex method is inefficient. This result spurred researchers to seek “polynomial algorithms” for which the computational effort required—even in the worst case—grows just polynomially with the size of the problem. We describe the ellipsoid method, the first method for linear programming shown to be polynomial. This discovery, in 1979, was received with much fanfare and optimism, soon to be followed by equally great disappointment. The method, while efficient in theory, is inefficient in practice, with its performance often matching the worst-case bound. These discouraging results led some researchers to focus on average-case rather than worst-case performance. In the last section of this chapter, we present results developed in the early 1980s that suggest that, measured by its average-case performance (albeit on a special set of problems), the simplex method is efficient. The simplex algorithm remained the leading method for linear programming until 1984, when Karmarkar proposed a new polynommial method for linear programming that showed promising, if not stellar, computational results. Karmarkar’s algorithm triggered 301

i

i i

i

i

i

i

302

book 2008/10/23 page 302 i

Chapter 9. Computational Complexity of Linear Programming

research into a new class of methods called interior-point methods that, in some cases, have good theoretical properties and are also competitive computationally with the simplex method. These methods are the subject of the next chapter.

9.2

Computational Complexity

The purpose of computational complexity is to determine the number of arithmetic or other computational operations required to solve a particular problem using a specific algorithm. We will refer to this as the cost of solving a problem. For example, what is the cost of solving a nonsingular system of n linear equations, using Gaussian elimination with partial pivoting? In this chapter, we will mainly be concerned with the cost of solving a linear programming problem. The cost of an algorithm can be measured in several ways. One measure is the “worst-case” cost: if some diabolical person were choosing an example so as to make the algorithm perform as poorly as possible, how many operations would the algorithm require to solve the problem? For algorithms such as Gaussian elimination applied to dense matrices, the worst-case behavior is also the typical behavior, so this is a useful measure of cost. Another measure is the “average-case” behavior of an algorithm, that is, the number of arithmetic operations required when the algorithm is applied to an “average” problem. The simplex method has poor worst-case behavior (see Section 9.3) but good averagecase behavior (see Section 9.5). In practice a worst-case analysis does not reflect the observed performance of the simplex method, so it is more plausible to consider averagecase performance. However, it is often more difficult to analyze the average-case behavior of an algorithm than the worst-case behavior. One preliminary difficulty is the definition of an “average” problem. For example, most large linear programs that arise in applications have sparse constraint matrices, but randomly generated matrices (with common choices of the underlying probability distribution) are almost certain to be dense. Also, applied problems are often degenerate, whereas random problems are, with probability one, nondegenerate. Disagreements about the definition of an “average” problem can raise doubts about the applicability of the corresponding estimates of average-case performance. There are other decisions that must be made in defining the cost of an algorithm, for example, defining what an “operation” is. In this book, we typically define an operation to be an arithmetic operation applied to two real numbers, such as an addition or a multiplication. Arithmetic operations are not the only operations that could be counted. There is work associated with retrieving a number from memory, storing a result in memory, and printing the solution to a problem. These could also be included as part of the cost of an algorithm. The amount of storage required by an algorithm could also be counted, although this would be significant only if the algorithm required intermediate storage much greater than that used to store the problem data. Computer implementations of the simplex method are almost always programmed using “real” arithmetic, meaning that the calculations are performed on floating-point numbers with a fixed number of digits. For the algorithms we discuss, the number of operations required to move numbers to and from memory is either proportional to, or overwhelmed by, the number of arithmetic operations, so these auxiliary operations are ignored. Finally,

i

i i

i

i

i

i

9.2. Computational Complexity

book 2008/10/23 page 303 i

303

the algorithms discussed here have storage costs proportional to the size of the problem data. As a result, in assessing the cost of an algorithm we will only count arithmetic operations on floating-point numbers. For example, the cost of applying Gaussian elimination to a system of n linear equations is about 23 n3 arithmetic operations. To make all these cost measures precise, computer scientists often describe algorithms in terms of an associated “Turing machine.” In his famous 1936 paper, Alan M. Turing described an imaginary computing device (since named after him) consisting of a processing unit together with an infinite tape divided into cells, each of which could record one of a finite set of symbols. The processing unit could be set in a finite number of “states,” and at every time step of the algorithm, the processing unit could either (i) read the symbol on the current cell of the tape, (ii) write a symbol on the current cell of the tape, (iii) move the tape one cell to the left, (iv) move the tape one cell to the right, (v) change state, or (vi) stop. Despite the primitive nature of this device, Turing argued convincingly in his paper that every sequence of steps that might be considered as a calculation could be performed by a machine of this type. Turing also described a “universal” machine of this type that could mimic all other such machines, a forerunner of our modern general-purpose computer. When Turing invented his machines, he was not interested in assessing the costs of algorithms, but instead used them as an intellectual tool to settle a famous problem about the axioms of arithmetic. They have since been used to define what is meant by an algorithm, or a step in an algorithm. We will not describe algorithms in terms of Turing machines, but will use more intuitive notions of computing. Even so, Turing machines will have a subtle influence on our discussions, particularly the notion of the “length of the input,” a measure of the size of the problem with connections to the “tape” in a Turing machine. When comparing algorithms, it is common to compare only the “order of magnitude” costs of the algorithms. For example, Gaussian elimination would cost O(n3 ) arithmetic operations, ignoring the constant 23 . If we say that the cost of an algorithm is O(f (L)), we mean that for sufficiently large L, number of arithmetic operations ≤ Cf (L), where C is some positive constant, L is a measure of the length of the input data for the problem, and f is some function. Because the constant is ignored, these order-of-magnitude estimates are mainly of value when L is large; for small L they can be deceptive, particularly if C is large. What do we mean by “the length of the input data” for a problem? In the case of a linear program, we will consider it to be the number of bits required to store all the data for the problem. This would include the number of variables n, the number of general constraints m, and the coefficients in the matrix A and the vectors b and c. We will assume that these numbers are all integers,9 so



L= log2 (|ai,j | + 1) + log2 (|bi | + 1) + log2 (|cj | + 1) i,j

i

j

+log2 (n + 1) + log2 (m + 1) + (nm + n + m + 1). 9A problem involving fractions can be converted into one with integers; a problem involving general real numbers would require infinite space to store the binary representations of these numbers. Finite-precision numbers stored by a computer can be represented as fractions.

i

i i

i

i

i

i

304

book 2008/10/23 page 304 i

Chapter 9. Computational Complexity of Linear Programming

Table 9.1. Polynomial and exponential growth rates. L 2 5 10 50 100

L2 4 25 1 × 102 3 × 103 1 × 104

L3 8 1 × 102 1 × 103 1 × 105 1 × 106

L100 1 × 1030 8 × 1069 1 × 10100 8 × 10169 1 × 10200

2L 4 32 1 × 103 1 × 1015 1 × 1030

L! 2 1 × 102 4 × 106 3 × 1064 9 × 10157

(The notation x denotes the smallest integer that is ≥ x.) The final term (nm + n + m + 1) represents the space needed to store the signs of all the numbers, plus an additional bit to indicate whether the linear program is a minimization or maximization problem. The number L is a coarse measure of the size of a problem. In many cases it may be more convenient to use a different measure, such as the number of variables. For example, some of the algorithms for linear programming that we discuss have costs that are O(n3 L) in the worst case. Since n < L, we could have written that the costs were O(L4 ), but it is common to use a more precise cost estimate when one is available. A distinction is made between “polynomial” and “exponential” algorithms. A polynomial algorithm has costs that are O(f (L)) in the worst case, where f (L) is a polynomial in L. An exponential algorithm has costs that grow exponentially with L in the worst case. For example, an exponential algorithm might have costs proportional to 2L . Exponential costs grow much more rapidly than polynomial costs as L increases, so exponential algorithms are often considered unacceptable for large problems. This is illustrated in Table 9.1. There are further categories of algorithms, between polynomial and exponential (with costs proportional to, say, Lln L ) and beyond exponential (with costs proportional to, say, L!). It is usually feasible to solve problems of size L = 100 if there is a polynomial-time algorithm, and the polynomial is of low degree. This may not be the case for exponential algorithms, where the costs increase rapidly with L. If f (L) is a polynomial of high degree, say f (L) = L100 , then even a polynomial algorithm will be unworkable for large problems in the worst case. In a great many cases, however, polynomial algorithms have costs that are O(L)–O(L4 ), whereas exponential algorithms have costs that are O(2L ) or worse, so the distinction between polynomial and exponential algorithms is a useful one.

Exercises 2.1. Determine L, the length of the input, for the linear program maximize subject to

z = 5x1 + 7x2 + 9x3 + 12x4 3x1 − 9x2 + 6x3 − 4x4 = 12 2x1 + 3x2 − 2x3 + 7x4 = 21 x1 , x2 , x3 , x4 ≥ 0.

2.2. Show that an iteration of the simplex algorithm in Section 5.2 has polynomial costs.

i

i i

i

i

i

i

9.3. Worst-Case Behavior of the Simplex Method

book 2008/10/23 page 305 i

305

2.3. If the cost of one algorithm is 2L and another is L100 , how large does L have to be before the polynomial algorithm becomes cheaper than the exponential algorithm? 2.4. Use Stirling’s formula to show that if an algorithm requires L! operations, then it is not a polynomial algorithm.

9.3 Worst-Case Behavior of the Simplex Method Ever since it was invented, the simplex method has been considered a successful method for linear programming. In 1953 a paper by Hoffman et al. compared the simplex method with several other algorithms and concluded that it was much faster, even though the others were better suited to the computers available at that time. It has been observed that the number of iterations required by the simplex method to find the optimal solution is often a small multiple of the number of general constraints. This is remarkable, since a problem with n variables and m constraints could have as many as   n m basic solutions (of course, many of these are likely to be infeasible). There was always the possibility that the simplex method might examine all of these bases before finding the optimal basis, but up until the 1970s no one had been able to exhibit a set of linear programs (with an arbitrary number of variables) where the simplex method took that many iterations to find a solution.   There is a considerable difference between m iterations and mn iterations. If we set n = 2m, then the values of these two quantities are m 1 5 10 20 50 100 200 300 400 500

2m m

2 252 184756 1 × 1011 1 × 1029 9 × 1058 1 × 10119 1 × 10179 2 × 10239 3 × 10299

Even for small values of m the number of possible bases is huge. If we had a computer  capable of performing one billion simplex iterations per second, then examining 100 bases 50 (that is, m = 50) would take 3,199,243,548,502.2 years. If the number of simplex iterations were proportional to m, then the simplex method would be a polynomial algorithm. All the operations in a simplex iteration are simple matrix and vector calculations, with total costs of O(mn) arithmetic operations if full pricing is

i

i i

i

i

i

i

306

book 2008/10/23 page 306 i

Chapter 9. Computational Complexity of Linear Programming

done. Periodic refactorization of the basis matrix costs O(m3 ) arithmetic operations. So the costs of a simplex iteration can be as high as O(m3 + nm) operations, and if O(m) iterations are performed, the overall costs of the simplex method are O(m4 +nm2 ) arithmetic operations. This number is a polynomial in n and m. (These costs would be lower if the problem weresparse; the estimates here are based on dense-matrix computations.) On the  other hand, if mn iterations were required, then the simplex method would be an exponential algorithm. If a trial basis to a linear program has been proposed, it is possible to check if it is optimal in polynomial time. The optimality test in the simplex method is one way to do it, involving the computation of the reduced costs. The reduced costs can be computed using O(m3 + nm) arithmetic operations. (If the linear program is degenerate, it is possible that the basis may not be optimal, even though the corresponding point x is optimal.) Together these comments show that the simplex method might be a polynomial algorithm (if the number of iterations were always O(m)) or an exponential algorithm (if the  number of iterations were sometimes mn ), but in either case a solution can be verified in polynomial time. All these facts were known in the early 1970s. In 1972 a paper by Klee and Minty showed that there exist problems of arbitrary size that cause the simplex method to examine every possible basis when the steepest-descent pricing rule is used, and hence showed that the simplex method is an exponential algorithm in the worst case. We give here a variant of the original Klee–Minty problems:

maximize

z=

m

10m−j xj

j =1

subject to

2

i−1

10i−j xj + xi ≤ 100i−1

for i = 1, . . . , m

j =1

x ≥ 0. When slack variables are added, there are 2m variables and m general constraints. These problems have 2m feasible bases. If the simplex method chooses the entering variable as the one with the largest violation in the optimality test (as usual), then every basis will be examined. Example 9.1 (Klee–Minty Problem). If m = 3, then the Klee–Minty problem has the form maximize subject to

z = 100x1 + 10x2 + x3 x1 ≤ 1 20x1 + x2 ≤ 100 200x1 + 20x2 + x3 ≤ 10000 x ≥ 0.

The feasible region is illustrated schematically in Figure 9.1.

i

i i

i

i

i

i

9.3. Worst-Case Behavior of the Simplex Method

book 2008/10/23 page 307 i

307

x3

x2 x1

Figure 9.1. Klee–Minty problem. When the simplex method is applied with the steepest-descent pricing rule, the sequence of basic feasible solutions is as follows: Basis s1 x1 x1 s1 s1 x1 x1 s1

=1 =1 =1 =1 =1 =1 =1 =1

s2 s2 x2 x2 x2 x2 s2 s2

= 100 = 80 = 80 = 100 = 100 = 80 = 80 = 100

z s3 s3 s3 s3 x3 x3 x3 x3

= 10000 = 9800 = 8200 = 8000 = 8000 = 8200 = 9800 = 10000

0 100 900 1000 9000 9100 9900 10000

This problem has 23 = 8 possible basic feasible solutions, and all are examined by the simplex method. In this example, the steepest-descent pricing rule causes the simplex method to examine all possible basic feasible solutions for the constraints. It would have been possible, however, to solve this problem at the first iteration if x3 had been chosen as the entering variable and s3 as the leaving variable. This raises the possibility that the simplex method, with a different pricing rule, might have better worst-case behavior. A number of researchers have examined this question and have shown that, for a variety of pricing rules, there are

i

i i

i

i

i

i

308

book 2008/10/23 page 308 i

Chapter 9. Computational Complexity of Linear Programming

corresponding linear programming problems that cause the simplex method to examine an exponential number of basic feasible solutions. Although these results do not fully settle the question, they raise doubts that such an efficient pricing rule exists. This is not the only question raised by the Klee–Minty example. For example, how common are linear programs that require exponentially many simplex iterations? How does the simplex method perform on an “average” problem? Are there algorithms for linear programming that require only a polynomial number of operations even in the worst case? These questions are discussed in the remaining sections of this chapter.

Exercise 3.1. Use linear programming software to solve Klee–Minty problems of various sizes. How many pivots are required? Are all basic feasible solutions examined?

9.4 The Ellipsoid Method In 1979 the Soviet mathematician Leonid G. Khachiyan settled one of these questions by exhibiting a polynomial-time algorithm for linear programming. (The algorithm was not new, but Khachiyan’s observations were.) His discovery received a great deal of attention, based on the hope that this algorithm might be a dramatically more efficient method for linear programming. Articles soon appeared in the New York Times and other general-interest publications, an indication of the immense practical importance of linear programming. Khachiyan’s method, based on a more general algorithm for convex programming and now called the ellipsoid method, is designed to find a point that strictly satisfies a system of linear inequalities. That is, it tries to find a point x such that Ax < b. Any linear programming problem can be transformed into a problem of this type, as we will now show. Suppose we are given a linear program in canonical form minimize subject to

z = cTx Ax ≥ b x≥0

maximize subject to

w = bTy AT y ≤ c y ≥ 0.

together with its dual program

i

i i

i

i

i

i

9.4. The Ellipsoid Method

book 2008/10/23 page 309 i

309

By duality theory (see Section 6.2), at the optimal solutions of both problems the two objective values will be equal, and the constraints to both problems will be satisfied: cTx − bTy Ax ATy x y

=0 ≥b ≤c ≥0 ≥ 0.

By weak duality, a pair of feasible points satisfies bTy ≤ cTx, so these conditions are equivalent to a system of linear inequalities of the form ˆ Aˆ xˆ ≤ b, where

⎛ ⎞ ⎞ 0 cT −bT   0 ⎟ ⎜ −b ⎟ ⎜ −A x ⎜ ⎟ ⎟ ⎜ , and bˆ = ⎜ c ⎟ . Aˆ = ⎜ 0 AT ⎟ , xˆ = y ⎝ ⎠ ⎠ ⎝ 0 −I 0 0 0 −I Because of this equivalence, we will assume in the rest of this section that we are solving a system of linear inequalities Ax ≤ b, where A is an m × n matrix. Assume that the entries in A and b are all integers, and that L is the length of the input data for the system Ax ≤ b:



L= log2 (|ai,j | + 1) + log2 (|bi | + 1) ⎛

i,j

i

+log2 (n) + log2 (m) + (nm + m),

where n is the number of variables and m is the number of inequalities. Let e = (1, . . . , 1)T. It can be shown that if the system Ax < b + 2−L e has a solution, then the system Ax ≤ b has a solution (see the paper by Gács and Lovász (1981)). These transformations allow us to solve a linear programming problem by solving a system of strict linear inequalities. Before giving a precise description of the ellipsoid method, we will describe it intuitively. To begin, an ellipsoid is the higher-dimensional generalization of an ellipse. In n-dimensional space, it can be defined as the set of points

¯ ≤1 , x : (x − x) ¯ TM −1 (x − x) where the vector x¯ of length n is the “center” of the ellipsoid and the n × n positive definite matrix M defines the orientation and shape of the ellipsoid. Example 9.2 (Ellipsoid). Let x¯ = (5, 4)T and  3 M= 1

1 3

 .

i

i i

i

i

i

i

310

book 2008/10/23 page 310 i

Chapter 9. Computational Complexity of Linear Programming

Figure 9.2. Ellipsoid. Then M

−1

1 = 8



3 −1

−1 3

 .

If we define y = x − x, ¯ then the condition (x − x) ¯ TM −1 (x − x) ¯ ≤1 simplifies to 1 (y 4 1

− y2 )2 + 18 (y1 + y2 )2 ≤ 1.

The ellipsoid is graphed in Figure 9.2. The ellipsoid method begins by selecting an ellipsoid centered at the origin (x¯ = x0 = 0) that contains part of the feasible region S = { x : Ax < b } . The first ellipsoid is defined by a positive-definite matrix M0 that is a multiple of the identity matrix. It is desirable to choose M0 so that the initial ellipsoid is as small as possible, since this will reduce the bound on the number of iterations required by the method. In the absence of other information, it is possible to choose M0 = 2L I , a choice which defines an ellipsoid sufficiently large that it is guaranteed to contain part of the feasible region, if this region is nonempty. This is just a simple way to initialize the method. It would be possible to begin with any ellipsoid that contains some part S¯ of the feasible region. At the kth iteration, the method first checks if the center x¯ = xk of the current ellipsoid is feasible: Axk < b. If so, the method terminates with xk as a solution. If not, then at least one of the constraints is violated. One of the violated constraints is used to determine a smaller ellipsoid with center xk+1 and matrix Mk+1 that also contains the part S¯ of the feasible region. Then the method repeats.

i

i i

i

i

i

i

9.4. The Ellipsoid Method

book 2008/10/23 page 311 i

311

At each iteration the size of the ellipsoid shrinks by a constant factor. Because the data for the problem are all integers, it is possible to show that, eventually, either a solution has been found or the ellipsoid is so small that the feasible region must be empty. (Each ellipsoid in the sequence contains the same part S¯ of the feasible region contained by the initial ellipsoid. It is possible to show that if the feasible region is nonempty, then there is ¯ Eventually the volume of the ellipsoid will be smaller a lower bound on the volume of S. than this lower bound, implying that the feasible region must have been empty.) Here then is the algorithm for finding a solution to Ax < b, where A is an m × n matrix, and L is the length of the input data. Algorithm 9.1. Ellipsoid Method 1. Set x0 = 0, M0 = 2L I . 2. For k = 0, 1, . . . (i) If Axk < b stop. (A feasible point xk has been found.) (ii) If k > 6(n + 1)2 L stop. (The feasible region is empty.) (iii) Otherwise, find any inequality such that aiTxk ≥ bi (that is, an inequality that is violated by xk ). Then set xk+1 = xk −

i

k i

 n 2 (Mk ai )(Mk ai )T . = 2 Mk − n −1 n+1 aiTMk ai 2

Mk+1

1 M k ai  n + 1 a TM a 

The form of the algorithm given here uses square roots, meaning that after the first iteration the numbers may not be representable as fractions. With more care, the limitations of finite-precision calculations can be taken into account. Let Ek be the ellipsoid at the kth iteration. If aiTxk ≥ bi , then any feasible point satisfies aiTx ≤ aiTxk . The formulas for xk+1 and Mk+1 define an ellipsoid Ek+1 that is the ellipsoid of minimum volume satisfying

Ek+1 ⊃ Ek ∩ x : aiTx ≤ aiTxk and



Ek+1 ∩ x : aiTx = aiTxk = Ek ∩ x : aiTx = aiTxk .

It is clear that Ek+1 contains the same portion of the feasible region that Ek does. This is illustrated in Figure 9.3. It is possible to show that volume (Ek+1 ) = c(n) volume (Ek ), where

 c(n) =

n2 2 n −1

(n−1)/2

n < e−1/2(n+1) < 1, n+1

i

i i

i

i

i

i

312

book 2008/10/23 page 312 i

Chapter 9. Computational Complexity of Linear Programming

Ek

xk +1

Ek

xk

xk

a T2 x = b2

Ek+1

a T1 x = b1

a T1 x =xk

a T2 x = b2

a T1 x = b1

Ek+2

Ek

x k+1 xk

Ek+1 a T1 x = b1

a T2 x = b2 a T2 x = a T2 xk+1

Figure 9.3. Sequence of ellipsoids. so that the volume of the ellipsoid is reduced by a constant factor at every iteration. (Here the term e−1/2(n+1) involves the number e ≈ 2.71.) Using the fact that the volume of the initial ellipsoid is bounded above by 2L(n+1) and that the volume of the portion S¯ of the feasible region (if the feasible region is nonempty) is bounded below by 2−(n+1)2L , it is straightforward to show that after at most 6(n + 1)2 L iterations, either a solution is found or the feasible region is empty. Example 9.3 (Ellipsoid Method). Consider the system of strict linear inequalities Ax < b:      x1 −1 0 −1 . < 0 −1 −1 x2 Here m = n = 2 and L = 12. At the first iteration, we will choose     0 1 0 x0 = and M0 = 4096 . 0 0 1 The first constraint is violated, so we can choose aiT = a1T = (−1, 0). Then M0 a1 = 4096(−1, 0)T, a1TM0 a1 = 4096, −1     64     64 −1 1 4096 0 0 0 − = 3 , − = x1 = 0 0 0 3 64 3 0

i

i i

i

i

i

i

Exercises and

book 2008/10/23 page 313 i

313 ' 1 0(   2 (4096)2 0 0 4 1 0 − 4096 M1 = 0 1 3 3 4096      2 1 0 16384 1 16384 1 0 − = = 0 1 0 3 3 0 0 9

0 3

 .

This completes the first iteration. At the second iteration, a2Tx1 = 0 > −1, so the second constraint is violated. When the formulas for the ellipsoid method are applied with aiT = a2T, we obtain   64   65536 1 0 3 . and M2 = x2 = 128 0 1 √ 27 3 3

This completes the second iteration. The point x2 satisfies the linear inequalities Ax < b, so the method terminates. The ellipsoid method requires at most 6(n + 1)2 L iterations, where n is the number of variables. If A is an m × n matrix, then computing xk+1 from xk requires O(mn + n2 ) arithmetic operations (the cost is dominated by the cost of finding a violated constraint and calculating Mk ai ). Computing Mk+1 from Mk requires an additional O(n2 ) operations. Overall, the ellipsoid method requires at most O((mn3 + n4 )L) arithmetic operations, making it a polynomial-time algorithm. Although the discovery of the ellipsoid method generated a great deal of excitement, the excitement quickly dissipated. It is true that in some cases (such as on the Klee–Minty problems) the simplex method would be much worse than the ellipsoid method. On many other problems, however, the simplex method is much better than the ellipsoid method. Computational experiments showed that the theoretical bounds on the performance of the ellipsoid method are qualitatively the same as its behavior on “typical” problems, whereas the performance of the simplex method is much better than its worst-case bounds. On practical problems the ellipsoid method is often slow to converge. It is not a practical alternative to the simplex method. The ellipsoid method is not without its uses. Variants of it have been developed that provide polynomial-time algorithms for problems whose computational complexity had been previously unknown. Also, each iteration of the ellipsoid method requires only that a violated constraint be found. This does not require that the complete set of constraints be explicitly represented, which is a useful property in some settings (see the paper by Bland, Goldfarb, and Todd (1981)). Perhaps the most important contribution of the ellipsoid method was that it settled the question of whether linear programs can be solved in polynomial time. On the other hand, it left unanswered the question of whether a practical polynomial-time algorithm for linear programming could be found.

Exercises 4.1. Fill in the details of the calculations for the second iteration of the ellipsoid method in Example 9.3.

i

i i

i

i

i

i

314

book 2008/10/23 page 314 i

Chapter 9. Computational Complexity of Linear Programming

4.2. Determine a more precise count on the number of arithmetic operations required for an iteration of the ellipsoid method. 4.3. For the Klee–Minty linear programs in Section 9.3, how large does m have to be before the ellipsoid method becomes more efficient than the simplex method? 4.4. Consider the ellipsoid defined by

x : (x − x) ¯ TM −1 (x − x) ¯ ≤1 , where x¯ is the center of the ellipsoid and M is a positive-definite matrix M. Define y = x − x. ¯ Assume that M has been factored as M = P P T, where  = diag (λ1 , . . . , λn ) is the matrix of eigenvalues and P = ( p1

· · · pn )

is the matrix of eigenvectors. Prove that the condition (x − x) ¯ TM −1 (x − x) ¯ ≤ 1 is equivalent to n

T 2 λ−1 i (pi y) ≤ 1. i=1

(The eigenvectors define the axes of the ellipsoid, and the eigenvalues determine the lengths of these axes.) Determine P and  for the ellipsoid in Example 9.2, and show that in this case the formula you have derived is equivalent to 1 (y 4 1

− y2 )2 + 18 (y1 + y2 )2 ≤ 1.

9.5 The Average-Case Behavior of the Simplex Method10 By the early 1960s the “conventional wisdom” was that the simplex method requires between m and 3m iterations to find the solution of a linear program in standard form with m general constraints. This conclusion was based on a great deal of practical experience with the simplex method, and it continued to be accepted even as solutions of larger and larger problems were attempted. These iteration counts were low enough to make the simplex method an efficient and effective tool for everyday use. Even the pessimistic examples of Klee and Minty (see Section 9.3) were not enough to dim the enthusiasm for the simplex method (in part because no other competitive method was available). Still, these pessimistic examples did raise doubts. Were such examples common? Would more bad examples show up as problems grew larger? Does there exist a large class of realistic problems that caused the simplex method to perform poorly? What is a “typical” linear programming problem? How did the simplex method behave on an “average” linear programming problem? We will concentrate on this last question. This question needs to be phrased more precisely before it can be answered. In particular, three things must be specified: (1) the variant of the simplex method that will be 10 This

section uses ideas from statistics.

i

i i

i

i

i

i

9.5. The Average-Case Behavior of the Simplex Method

book 2008/10/23 page 315 i

315

used, (2) the class of linear programming problems that will be solved, and (3) the stochastic model that will be used to define a “random” or “average” problem. We might hope to use the simplex method from Chapter 5, applied to linear programs in standard form, with some “simple” stochastic model. However, the results we present are not for this case. Analyzing average-case behavior for the simplex method is difficult, and the results obtained are often influenced by the availability and tractability of appropriate mathematical tools. This has led researchers to study less familiar variants of the simplex method. In addition, care must be taken in the choice of a stochastic model, or else there is a possibility that an “average” problem may not be defined. These issues can quickly become complicated, while the discussion given here is brief; for further information see the book by Borgwardt (1987). In this section we assume that the linear programs are in the form maximize subject to

z = cTx Ax ≤ b,

where A is an m × n matrix. The ith row of A is denoted by aiT. We also assume that a feasible initial point x0 is provided. (For certain results, the right-hand-side vector will be chosen as b = e ≡ (1, . . . , 1)T so that x0 = 0 will automatically be feasible for the problems.) A variant of the simplex method called the shadow vertex algorithm will be used to solve the linear programs. It is a form of parametric programming and is described in Section 6.5. The first proof to show that, on average, a variant of the simplex method converged in a number of iterations that was a polynomial in m and n, was discovered by Borgwardt in 1982. His theorem is given below. It assumes that the coefficients in the linear program are chosen randomly in n \ { 0 }, meaning that none of the vectors in the problem can be equal to zero (although individual coefficients might be zero). The right-hand side in the “average” linear program considered in the theorem is not random—it is the vector e = (1, . . . , 1)T. Note that there are no explicit nonnegativity constraints on the variables. Theorem 9.4. Consider a linear program of the form maximize z = cTx subject to Ax ≤ e, where c, a1 , . . . , am are independently and identically distributed in n \ { 0 }, and the distribution is symmetric under rotations. If the shadow vertex method is used with a feasible initial point, the expected number of iterations is bounded by 17n3 m1/(n−1) . This result established the polynomial-time average behavior of the simplex method, but the bound obtained did not correspond to the observed practical behavior of the method (that is, between m and 3m iterations). A result with a more satisfying conclusion was obtained independently by Haimovich and Adler in 1983. It also uses the shadow vertex method, with an assumption about the existence of a “cooptimal path” (this term is explained

i

i i

i

i

i

i

316

book 2008/10/23 page 316 i

Chapter 9. Computational Complexity of Linear Programming

in Borgwardt (1987)). The form of the linear program is slightly different (it allows a general right-hand-side vector b), and a different stochastic model is used. Theorem 9.5. Consider a linear program of the form maximize z = cTx subject to Ax ≤ b. The coefficients c, A, and b are assumed to be chosen randomly in such a way that the problem is nondegenerate, and so that the constraints aiTx ≤ bi and

− aiTx ≤ −bi

are equally likely. If the shadow vertex method is used with a random initial basic feasible point x0 , and if a cooptimal path exists, then the expected number of iterations is bounded by n

m−n+2 . m+1

For the linear programs in Theorem 9.5 there need not be an obvious initial feasible point. Related results have shown that, if a two-phase approach is used in such cases, then the average number of iterations is bounded by 

 O min (m − n)2 , n2 for a related stochastic model as in the theorem, but without the assumption about the cooptimal path. These two results are not straightforward to compare. Theorem 9.5 has a more optimistic conclusion, but its stochastic model can produce problems with a great many redundant constraints (so that m is an overestimate of the “effective size” of the linear program) and can produce many infeasible or unbounded, and hence irrelevant, problems. The stochastic model in Theorem 9.4 allows varying amounts of redundancy in the constraints, and all the problems generated are automatically feasible; moreover, the algorithm uses the known feasible solution at the origin to get started. However, this stochastic model rules out many practical problems since rotational symmetry implies that sparse problems are rare under these assumptions, whereas large, practical problems are almost always sparse.

9.6

Notes

Complexity—Background material on computational complexity can be found in the book by Papadimitriou and Steiglitz (1982, reprinted 1998). Klee–Minty Problem—The variant of the Klee–Minty example that we use here is due to Chvátal (1983). Ellipsoid Method—The survey papers of Bland, Goldfarb, and Todd (1981) and Schrader (1982, 1983) provide extensive background information on the ellipsoid method. The book of Schrijver (1986, reprinted 1998) is another useful source of information on this and other topics in this chapter. The ellipsoid method is derived from a method for

i

i i

i

i

i

i

9.6. Notes

book 2008/10/23 page 317 i

317

solving nonsmooth convex programming problems discussed in the paper by Shor (1964). This method was improved by Yudin and Nemirovskii (1976). Khachiyan (1979) showed that this improved method, when specialized to linear programming problems, yielded a polynomial-time algorithm. Khachiyan’s original publication was only an extended abstract, but was followed by a more detailed paper. The extended abstract was expanded upon in the paper of Gács and Lovász (1981), and this was the first detailed discussion of Khachiyan’s work in English. Average-Case Behavior—For an in-depth probabilistic analysis of the simplex method refer to the book by Borgwardt (1987). Recently, Spielman and Teng (2004) developed an approach called smoothed analysis that is a hybrid of worst-case and average-case analyses and can inherit the advantages of both.

i

i i

i

i

book 2008/10/23 page 318 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 319 i

Chapter 10

Interior-Point Methods for Linear Programming

10.1

Introduction

Interior-point methods are arguably the most significant development in linear optimization since the development of the simplex method. The methods can have good theoretical efficiency and good practical performance that are competitive with the simplex method. An important feature common to these algorithms is that the iterates are strictly feasible. (A strictly feasible point for the set {x : Ax = b, x ≥ 0} is defined as a point x such that Ax = b and x > 0.) Thus, in contrast to the simplex algorithm, where the movement is along the boundary of the feasible region, the points generated by these new approaches lie in the interior of the inequality constraints. For this reason the methods are known as interior-point methods. This chapter discusses the underlying ideas in this important class of methods. The seminal thrust in the development of interior-point methods for linear programming was the 1984 publication by Narendra Karmarkar of a new polynomial-time algorithm for linear programming. Five years earlier, the ellipsoid method—the first polynomial-time algorithm for linear programming—had been publicized and received with great excitement, soon to be followed with great disappointment due to its poor computational performance. Karmarkar’s method, in contrast, was claimed from the outset to perform extraordinarily well on large linear programs. Although some initial assertions on the performance (“50 times faster than the simplex method”) have not been established, it is now accepted that interior-point methods are an important tool in linear programming that can outperform the simplex method on many problems. The publication of Karmarkar’s new algorithm led to a flurry of research activity in the method and related methods. This activity was further increased with the surprising discovery in 1985 that Karmarkar’s method is a specialized form of a class of algorithms for nonlinear optimization known as barrier methods (see Section 16.2). Barrier methods solve a constrained problem by minimizing a sequence of unconstrained barrier functions. The methods were used and studied intensively in the 1960s. At that time, they were one of the few options for solving nonlinear optimization problems, but they were not seriously considered for solving linear programs because the simplex 319

i

i i

i

i

i

i

320

book 2008/10/23 page 320 i

Chapter 10. Interior-Point Methods for Linear Programming

method was so effective. Eventually barrier methods were deemed by many researchers to be inefficient even for nonlinear optimization, mainly because they were thought to suffer from serious numerical difficulties. In the early 1970s barrier methods started to fall from grace, and by the early 1980s they were all but discarded. All this abruptly changed in 1984. Barrier methods, and in particular, those employing the logarithmic barrier function, became the focus of renewed research and spawned many new algorithms. Most interior-point algorithms for linear programming fall into the following three main classes, each of which can be motivated by the logarithmic barrier function: pathfollowing methods, potential-reduction methods, and affine-scaling methods. Path-following methods attempt to stay close to a “central trajectory” defined by the logarithmic barrier function; potential-reduction methods attempt to obtain a reduction in some merit or potential function that is related to the logarithmic barrier function; and affine-scaling methods sequentially transform the problem via an “affine scaling.” This is only a rough classification, and algorithms often combine ideas from the various categories. The algorithms may be characterized as either primal methods (maintaining primal feasibility), dual methods (maintaining dual feasibility), or primal-dual methods (maintaining feasibility to both problems). Throughout our discussion we will assume that the primal problem has the standard form minimize

z = cTx

subject to

Ax = b x ≥ 0.

In general, the iterates of primal interior-point methods satisfy the equality constraints and strictly satisfy (and hence are interior to) the nonnegativity constraints. Thus an iterate xk satisfies Axk = b, with xk > 0. Primal methods usually compute some estimate of the dual variables. Convergence is attained when the estimate is dual feasible and the duality gap is zero (to within specified tolerances). Dual interior-point methods operate on the dual problem maximize

w = bTy

subject to

AT y + s = c s ≥ 0.

Again, the iterates satisfy the equality constraints and strictly satisfy the nonnegativity constraints. Thus an iterate (yk , sk ) satisfies ATyk + sk = c, with sk > 0. Dual methods usually compute some estimate of the optimal primal variables; as in primal methods, these are used to test for convergence. Primal-dual methods attempt to solve the primal and dual problems simultaneously. In these methods, the primal and dual equality constraints are both satisfied exactly, while the nonnegativity constraints on x and s are strictly satisfied. Convergence is attained when the duality gap reaches zero (to within some tolerance). If x is feasible to the primal, and (y, s) is feasible to the dual, then cTx − bTy = x Ts. Thus a condition on the duality gap is equivalent to a condition on complementary slackness.

i

i i

i

i

i

i

10.2. The Primal-Dual Interior-Point Method

book 2008/10/23 page 321 i

321

In terms of theoretical performance—complexity— there are many papers that give bounds on the number of iterations and arithmetic operations required by these methods to solve a linear programming problem. These bounds vary, depending on the particular algorithm used and the choice of the parameter settings. Karmarkar’s original method requires at most O(nL) iterations to solve a problem, with each iteration requiring O(n3 ) arithmetic operations, for a total of O(n4 L) arithmetic operations. (As usual, n is the number of variables and L is the length of the input data.) Subsequent results have reduced this to √ O( nL) iterations and an average of O(n2.5 ) operations per iteration, for a total of O(n3 L) operations. The bound for the ellipsoid method is O((mn3 + n4 )L). The bounds for the two methods are surprisingly close, but while the practical performance of the ellipsoid method matches its theoretical bound, practical interior-point methods perform far better than the theory predicts. It would be of great value if there were some theoretical criterion that predicted accurately whether a method would perform well practically, but unfortunately no such criterion is currently known. Some successful interior-point algorithms are polynomial algorithms, although the most successful implementations of these methods may not be. Also, algorithms such as the primal and dual affine methods are competitive, even though they are believed to be nonpolynomial. A great many algorithms with fine theoretical properties have never been tested on an extensive set of large problems. Our focus in this chapter is on methods that have been successfully implemented in the solution of large-scale linear programs. We start with the primal-dual path-following method, the algorithm that has proved the most successful in practice. We discuss the method, as well as a technique for accelerating performance called the predictor-corrector method. We also discuss computational issues for the primal-dual method and interior-point methods in general. Next we present a “self-dual” formulation of the linear problem that allows for an efficient solution if a strictly feasible starting point is not known—and even if the problem is infeasible. We also present affine methods, and finally we give a more detailed discussion of path-following methods. Interestingly, Karmarkar’s method—the method that transformed the entire field of linear optimization—does not match the leading methods in its computational performance. For this reason we do not include a detailed discussion of Karmarkar’s method, although one is available on the book’s Web page, http://www.siam.org/books/ot108. Interior-point methods are intrinsically based on nonlinear optimization methodology. However, it is possible to motivate the primal-dual path-following method using just concepts of linear optimization, and this is the approach taken in our presentation. The more theoretical aspects of path-following methods as well as affine-scaling methods are based on ideas from nonlinear optimization; a brief overview of the concepts required is given in Section 10.4.

10.2 The Primal-Dual Interior-Point Method We describe here the primal-dual method, an interior-point method which has been particularly successful in practice. The method was originally developed as a theoretical, polynomial-time algorithm for linear programming, but it was quickly discovered that it could be adapted to give extraordinary practical performance.

i

i i

i

i

i

i

322

book 2008/10/23 page 322 i

Chapter 10. Interior-Point Methods for Linear Programming

To present the primal-dual method, we consider a linear program in standard form (the primal problem) z = cTx (P) Ax = b x ≥ 0. We assume that A is an m × n matrix of full row rank. This assumption is not always necessary, but it simplifies the discussion. If we denote by s the vector of dual slack variables, the corresponding dual problem can be written as minimize subject to

maximize subject to

w = bTy AT y + s = c s ≥ 0.

(D)

Let x¯ be a feasible solution to (P), and let (y, ¯ s¯ ) be a feasible solution to (D). These points will be optimal to (P) and (D) if and only if they satisfy the complementary slackness conditions xj sj = 0, j = 1, . . . , n. The main idea of the primal-dual method is to move through a sequence of strictly feasible primal and dual solutions that come increasingly closer to satisfying the complementary slackness conditions. Specifically, at each iteration we attempt to find vectors x(μ), y(μ), and s(μ) satisfying, for some μ > 0, Ax = b ATy + s = c xj sj = μ, x, s ≥ 0.

j = 1, . . . , n

(PD)

The value of the parameter μ is then reduced and the process repeated until convergence is achieved (to within some tolerance). If μ > 0, the condition xj sj = μ guarantees that x > 0 and s > 0; that is, the iterates are strictly feasible. These conditions also constrain the duality gap since cTx − bTy = x Ts = nμ. (See the Exercises.) Thus, the algorithm attempts to find a sequence of primal and dual feasible solutions with decreasing duality gaps. If the duality gap were zero, then the points would be optimal. Closeness to the solution will be measured by the size of the duality gap. It is convenient to represent the conditions on complementary slackness in matrixvector notation. Let X = diag (x) be a diagonal matrix whose j th diagonal term is xj . Similarly, let S = diag (s), and let e = (1

· · · 1 )T

be the vector of length n whose entries are all equal to one. Thus we can write x = Xe, s = Se, and the complementary slackness condition may be written as XSe = μe. In the primal-dual algorithm the main computational effort is solving the primal-dual equations (PD). To save computation, we shall not solve them exactly but only approximately.

i

i i

i

i

i

i

10.2. The Primal-Dual Interior-Point Method

book 2008/10/23 page 323 i

323

Thus at every iteration we shall only have an estimate of the solution to (PD). We now discuss how to obtain such an estimate. Suppose that we have estimates x > 0, y, and s > 0 such that Ax = b and ATy+s = c, but xj sj are not necessarily equal to μ. We shall find new estimates x + x, y + y, s + s that are closer to satisfying these conditions. The requirements for primal feasibility are easy to state: we require that A(x + x) = b, and since Ax = b, it follows that A x = 0, which is a system of linear equations in x. Similarly, in order to maintain dual feasibility we must satisfy the linear system AT y + s = 0, which is a system of linear equations in y and s. The equations for complementary slackness, (xj + xj )(sj + sj ) = μ, can be written as sj xj + xj sj + xj sj = μ − xj sj and must be satisfied for all j . These are nonlinear equations in xj and sj . To obtain an approximate solution we ignore the term xj sj . If xj and sj are both small, then their product will be much smaller, justifying this action. The resulting system is now linear: sj xj + xj sj = μ − xj sj . We have approximated the nonlinear system by a linear system. This technique for solving nonlinear equations by linearizing them is known as Newton’s method (see Section 2.7). At each iteration of the primal-dual method we perform one iteration of Newton’s method for solving (PD). We will refer to the search directions as the Newton directions. In summary, the vectors x, y, s are obtained by solving the linear system S x + X s = μe − XSe A x = 0 AT y + s = 0. To solve this system, we use the third equation to obtain s = −AT y. Substituting in the first equation we obtain S x − XAT y = μe − XSe. Multiplying this equation by AS −1 and using A x = 0, we get −AS −1 XAT y = AS −1 (μe − XSe). Define the diagonal matrix D ≡ S −1 X, and let v(μ) = μe−XSe. Then the solution vectors can be written as y = −(ADAT )−1 AS −1 v(μ) s = −AT y x = S −1 v(μ) − D s. If some xj or sj is zero, then these formulas are not defined.

i

i i

i

i

i

i

324

book 2008/10/23 page 324 i

Chapter 10. Interior-Point Methods for Linear Programming

The algorithm is as follows. Assume that we are given strictly feasible initial estimates x > 0, y, and s > 0 of the primal, dual, and dual slack variables. We compute the directions x, y, and s. We define the new estimates of the solutions as x + x, y + y, and s + s. Then we reduce μ and repeat. If the parameter μ is updated as μk+1 = θμk , with 0 < θ < 1, then under appropriate conditions on θ the new estimates are guaranteed to be strictly feasible (x > 0, s > 0), and the resulting algorithm is polynomial. Unfortunately the values of θ for which this is true are close to √ 1. For example, the paper of Monteiro and Adler (1989) indicates that using θ = 1 − 3.5/ n will suffice. The √ resulting method requires at most O( nL) iterations, a good theoretical result. In practice, however, this value of θ is inefficient since μ decreases slowly, and the algorithm requires many iterations to reach a sufficiently low value of μ, a value where the difference between the primal and dual objectives is sufficiently close to zero. To transform the method into a practical algorithm, we should decrease μ more rapidly. However, with these larger changes in μ, the new estimates of the solution may no longer be strictly feasible; that is, the variables may fail to satisfy the conditions x > 0 and s > 0. Therefore, the update rule for the new point is modified to x(α, μ) = x + α x y(α, μ) = y + α y s(α, μ) = s + α s, where α is a step length chosen to ensure that x and s are positive. Even when a step length of 1 is strictly feasible, a larger step may be better. A strategy that has yielded good computational results is to take a large step which still maintains strict feasibility. For example, one may take α as 99.999% of the distance to boundary, that is, α = 0.99999αmax , where αmax is the largest step satisfying xj + αmax xj ≥ 0

and

sj + αmax sj ≥ 0

for all j . This value is explicitly given by αmax = min(αP , αD ), where αP = min (−xj / xj ) xj 0. It might be difficult to find such points, and in such cases it is useful to modify the primal-dual method so that infeasible starting guesses can be used. Assume that x, y, and s have been specified, with x > 0 and s > 0. Then we attempt to choose x, y, and s to satisfy A(x + x) = b AT(y + y) + (s + s) = c (xj + xj )(sj + sj ) = μ. If, as before, we ignore the term xj sj , then these equations can be transformed into S x + X s = μe − XSe ≡ v(μ) A x = b − Ax ≡ rP AT y + s = c − ATy − s ≡ rD . Here rP is the residual for the primal constraints Ax = b, and rD is the residual for the dual constraints ATy + s = c. An analysis similar to that used earlier can be used to show that y = −(ADAT)−1 [AS −1 v(μ) − ADrD − rP ] s = −AT y + rD x = S −1 v(μ) − D s. These formulas are only a slight modification of those derived earlier, indicating that infeasible starting points can be handled in a straightforward manner within the primal-dual method. This modification is useful if the primal and dual have feasible solutions. If the primal or the dual is infeasible, this modification may fail to converge. An alternative approach that can detect whether the primal and dual are feasible is given in Section 10.3.

10.2.1

Computational Aspects of Interior-Point Methods

An important question is how interior-point methods and simplex methods compare on practical problems. Extensive computational tests indicate that interior-point methods in general—not just primal-dual path-following methods—require few iterations to solve a linear program, typically 20–60, even for large problems. Interior-point methods are affected little, if at all, by degeneracy. Each iteration of an interior-point method is expensive, requiring the solution of a system of linear equations involving the matrix ADAT, where D is a diagonal matrix. (For the primal-dual method, D = S −1 X; the formulas for D differ among the various interior-point methods.) The matrix ADAT changes in every entry at every iteration, so it must be factored at every iteration. This matrix can be much less sparse than A. (Since D is diagonal, the sparsity pattern of ADAT does not change when D changes. Hence the sparsity pattern need only be analyzed once, and only a single symbolic factorization is required. The numerical factorization, however, is performed at every iteration. See Appendix A.6.1.)

i

i i

i

i

i

i

10.2. The Primal-Dual Interior-Point Method

book 2008/10/23 page 329 i

329

Simplex methods typically require between m and 3m iterations, where m is the number of constraints. The number of iterations can increase dramatically on degenerate problems, or can decrease dramatically if a good initial basis is provided. Each iteration of the simplex method is cheap. The linear systems in the simplex method involve the basis matrix B. This matrix changes only in one column at each iteration, so that a factorization of B can be updated at every iteration, which is much less expensive than a refactorization. Since B consists of columns of A, it is as sparse as A. A few conclusions can be drawn from these observations. If no good initial guess of the solution is available, or if ADAT is sparse and easy to factor, or if the problem is degenerate, then interior-point methods are likely to perform well. However, if ADAT is not sparse or is not easy to factor, or if a good initial guess is available (as in sensitivity analysis, or in applications where the linear program is solved repeatedly with slightly changing data), then the simplex method is likely to perform well. Finally, interior-point methods do not produce an optimal basic feasible solution. Some auxiliary “basis recovery” procedure must be used to determine an optimal basis. In some applications, a basic feasible solution is of value, and this requirement can favor the use of the simplex method.

10.2.2 The Predictor-Corrector Algorithm The predictor-corrector method is a modification of the primal-dual method that can reduce the number of iterations required by the method with only a modest increase in the cost per iteration. It is currently used in most interior-point software packages. In our derivation we ignored the second-order terms of the form xj sj in the equation (xj + xj )(sj + sj ) = μ. They were ignored under the assumption that they were small. This is likely to be true if x and s are near their optimal values, but it might be false at points far from the optimum. The predictor-corrector method is designed to take these second-order terms into account by attempting to find a solution to the system S x + X s = μe − XSe − X Se A x = b − Ax y + s = c − ATy − s,

(PC)

where X = diag ( xj ) and S = diag ( sj ). This is done in two steps. In the “predictor” step, a prediction of x and s is obtained, together with a prediction of a “good” value of μ (that is, a value of μ that is related to the values of x and s). In the “corrector” step, these predicted values are used to obtain an approximate solution to the (PC) system. The predictor step solves the system (PC) with the term μe − X Se ignored: S x + X s = −XSe A x = b − Ax AT y + s = c − ATy − s. ˆ These are used to determine intermediate This determines intermediate values Xˆ and S. solutions xˆ and sˆ , and in turn an updated value of μ based on the updated duality gap. (See

i

i i

i

i

i

i

330

book 2008/10/23 page 330 i

Chapter 10. Interior-Point Methods for Linear Programming

ˆ and Sˆ are then substituted the paper by Mehrotra (1992) for details.) The values of μ, X, into the (PC) equations, ˆ Se ˆ S x + X s = μe − XSe − X A x = b − Ax AT y + s = c − ATy − s, which are then solved for x, y, and s. This approach might seem to double the cost of an iteration of the primal-dual method. In fact, the corrector step uses the same factorization of the matrix ADAT as the predictor step, so the predictor-corrector approach only slightly increases the cost of each iteration, and it offers the potential of decreasing the number of iterations required by the primal-dual method. Computational testing has shown that this combined approach forms one of the most effective of interior-point methods.

Exercises 2.1. Apply the primal-dual method to the linear program in Example 10.1, but using the infeasible initial guess x = (1, 1, 1, 1, 1)T, y = (0, 0, 0)T, and s = (1, 1, 1, 1, 1)T. 2.2. Apply the predictor-corrector method to the linear program in Example 10.1. Choose μ so that (x + x) ˆ T(s + ˆs ) = nμ. 2.3. Apply the primal-dual method to the linear program in Example 10.1. Reduce μ by using the formula μk+1 = θμk √ with θ = 1 − 1/ n. Use α = 1 at every iteration. 2.4. For the primal-dual pair of linear programs (P) and (D) prove that the duality gap satisfies cTx − bTy = x Ts, and prove further that the solution to (PD) satisfies cTx − bTy = x Ts = nμ. 2.5. Prove that, if D is a nonsingular diagonal matrix, then the sparsity pattern of ADAT is in general unaffected by the values of D. 2.6. Prove that, if one of the columns of A is dense (has no zero entries), and D is a nonsingular diagonal matrix, then ADAT will in general be a dense matrix. 2.7. Suppose that exactly one of the columns of A is dense (see the previous problem) and let Aˆ be the matrix obtained by replacing this column by a column of zeroes. ˆ Aˆ T is sparse and nonsingular, where D is a nonsingular diagonal Assume that AD matrix. Show how to use the Sherman–Morrison formula (see Appendix A.9) to efficiently solve linear systems involving the matrix ADAT.

i

i i

i

i

i

i

10.3. Feasibility and Self-Dual Formulations

book 2008/10/23 page 331 i

331

2.8. Suppose

  γ μk+1 = 1 − √ μk , n where 0 < γ < 1. Given μ0 , find the number of iterations required to obtain μk ≤ , for any given  > 0.

10.3

Feasibility and Self-Dual Formulations

The path-following methods we have discussed have a drawback: they assume that the primal and dual problems are feasible. In practice, if either the primal or dual problem is infeasible, these methods can diverge, even when an adaptation for infeasible starting points is applied. We describe here a method that overcomes this difficulty by reformulating the problem in a special way. The resulting formulation has several attractive properties. First, it does not require that an initial feasible solution to the original problem be known, nor does it assume that such a solution exists. Second, when an interior-point method such as the primal-dual algorithm is used to solve the reformulated problem, it will converge to an optimal solution if an optimum exists; otherwise, it will detect that either the primal or the dual is infeasible. Third, the size of the problem is only slightly √ larger than the original primal-dual pair. Finally, the problem can still be solved in O( nL) iterations. The approach we describe embeds the problem in a self-dual linear optimization problem. A self-dual problem is a problem that is equivalent to its dual. In canonical form it can be written as minimize q Tu u

subject to

Mu ≥ −q u ≥ 0,

where q ≥ 0 and the matrix M is skew symmetric, that is, M T = −M. The problem has a feasible solution u = 0, and since q ≥ 0, the optimal objective value is zero. Denote by v the slack vector for the constraints: v = Mu + q, where v ≥ 0. The self-duality implies that any vectors u and v that are feasible to the primal are also feasible to the dual, with v corresponding to the dual slack variables. At the optimum, u and v will satisfy the complementary slackness condition, so uTv = 0. Suppose that we are given a linear program in canonical form minimize

z = cTx

subject to

Ax ≥ b x ≥ 0,

maximize

w = bTy

subject to

AT y ≤ c y ≥ 0.

together with its dual program

i

i i

i

i

i

i

332

book 2008/10/23 page 332 i

Chapter 10. Interior-Point Methods for Linear Programming

By duality theory, if both problems have optimal solutions, then their solutions will satisfy the system of inequalities Ax ≥ b, x ≥ 0 − ATy ≥ −c, y ≥ 0 bTy − cTx ≥ 0. Of course, if either the primal or the dual is infeasible, this system will not have a solution. However, if we introduce a nonnegative scalar variable τ and define a new homogeneous system of inequalities Ax − bτ ≥ 0 − ATy + cτ ≥ 0 bTy − cTx ≥ 0, where x, y, τ ≥ 0, then this new system always has a feasible solution since the vector of all zeroes is feasible. Moreover, it is easy to see that if τ is positive at any feasible solution to the system, then the vectors x/τ and y/τ solve the primal and dual problems, respectively. Therefore, if we define     0 A −b y M¯ = −AT 0 c , u¯ = x , bT −cT 0 τ then we are interested in finding a solution of the homogeneous system M¯ u¯ ≥ 0,

u¯ ≥ 0

for which τ > 0. If such a solution exists, we can immediately obtain the solution of the original linear program. We still face two challenges. The first is to devise an approach that identifies whether a solution with τ > 0 exists. The second is that we would like to solve the system via an interior-point method; however, the system has no feasible point that strictly satisfies all inequalities. Indeed, any strictly feasible point (x, y, τ ) > 0 also satisfies bTy − cTx = 0 (see the Exercises), so the last inequality cannot be strictly satisfied. To address this we will expand the dimension of the system by adding one nonnegative variable and one constraint. The new variable, θ , is akin to an artificial variable that will start with a value of 1 and converge to zero. The coefficients of θ in each of the m + n + 1 original rows are designed so that the slack in each of these rows will have an initial value of 1. Assume for simplicity that the starting points x0 , y0 , and θ0 are vectors of all 1’s. Then the coefficients of θ in the new column will be ¯ r = e − Me, where e is a vector of 1’s of length m + n + 1. The new constraint is designed to keep the expanded matrix skew symmetric, so its coefficients are ( −r T 0 ). The corresponding right-hand-side coefficient is set to −(m + n + 2), so that the slack of the constraint at the initial iteration is equal to 1. We now obtain

i

i i

i

i

i

i

10.3. Feasibility and Self-Dual Formulations

book 2008/10/23 page 333 i

333

our equivalent self-dual problem:



where M=

M¯ −r T

r 0

minimize

q Tu

subject to

Mu ≥ −q u ≥ 0,

 ,

u=

  u¯ , θ

(SD) 

q=

0 m+n+2

 .

The objective is to minimize q Tu = (m + n + 2)θ . Since u = 0 is a feasible solution and θ ≥ 0, any optimal solution u∗ to (SD) will have θ∗ = 0. The primal-dual algorithm for problem (SD) is straightforward. Since the primal is equivalent to the dual, the Newton step satisfies U v + V u = μe − U V e M u + v = 0, where v = Mu + q is the primal (and dual) slack, U = diag (u), and V = diag (v).√With appropriate reduction in the barrier parameter, the algorithm converges within O( nL) iterations. Denote ⎞ ⎛ ⎞ ⎛ y∗ vD∗ ⎜x ⎟ ⎜v ⎟ u∗ = ⎝ ∗ ⎠ , v∗ = ⎝ P ∗ ⎠ . τ∗ ρ∗ θ∗ η∗ The limiting solutions u∗ and v∗ satisfy strict complementarity, meaning that if (u∗ )i = 0, then (v∗ )i > 0. The proof of the latter point is quite technical and we will omit it; however, it is an important point. It allows us to prove the following lemma. Lemma 10.2 (Strictly Complementary Solution to the Self-Dual Problem). Let u∗ and v∗ be optimal solutions to the self-dual problem (SD) that satisfy strict complementarity. Then (i) if τ∗ > 0, then x∗ /τ∗ is an optimal solution to the primal and y∗ /τ∗ is an optimal solution to the dual; (ii) if τ∗ = 0, then either the primal problem or the dual problem is infeasible, or possibly both. Proof. Part (i) is straightforward and has already been discussed above. To prove part (ii) we note that, because θ∗ = 0, then if τ∗ = 0, we have Ax∗ ≥ 0

and

ATy ≤ 0.

Also, since v∗ = Mu∗ + q, we have that ρ∗ = bTy∗ − cTx∗ . Consider now the strict complementarity between τ∗ and its corresponding dual slack variable ρ∗ . Since τ∗ = 0, then ρ∗ > 0, and hence bTy∗ − cTx∗ > 0.

i

i i

i

i

i

i

334

book 2008/10/23 page 334 i

Chapter 10. Interior-Point Methods for Linear Programming

This implies that either bTy∗ > 0, or cTx∗ < 0, or possibly both. Suppose bTy∗ > 0. Then for any feasible solution x to the primal we have 0 ≥ (y∗TA)x = y∗T(Ax) ≥ y∗Tb > 0, which is a contradiction, so the primal must be infeasible. Similarly if cTx∗ < 0, then for any feasible solution y to the dual we have 0 ≤ (Ax∗ )Ty = x∗T(ATy) ≤ x∗Tc < 0, which is a contradiction, and the dual must be infeasible. Finally, if both bTy∗ > 0 and cTx∗ < 0, then both the primal and dual problems are infeasible. The lemma shows that applying a primal-dual algorithm to a problem in self-dual form will yield either an optimal solution to the primal and dual problems, or a confirmation that one of these problems is infeasible.

Exercises 3.1. Let M be an n × n skew-symmetric matrix, and let q be a nonnegative n-dimensional vector. Prove that the problem minimize

q Tu

subject to

Mu ≥ −q u≥0

u

3.2. 3.3. 3.4.

3.5.

is self-dual. Give an example for a two-dimensional self-dual linear program. Prove that, if the n × n matrix M is skew symmetric, then uTMu = 0 for any n-dimensional vector u. Prove that, for any positive vector u¯ = (y T, x T, τ )T satisfying M¯ u¯ ≥ 0, the constraint bˆ Ty − cTx ≥ 0 is binding. (Hint: Use the fact that x/τ solves the primal and y/τ solves the dual.) Set up the self-dual formulation corresponding to the problem minimize subject to

10.4

z = x1 − x2 x1 + x2 ≤ 2 x1 , x2 ≥ 0.

Some Concepts from Nonlinear Optimization

Interior-point methods for linear programming are inherently based on nonlinear optimization techniques. Luckily, only a few results are needed to gain an understanding of these methods. Here we shall give a brief summary of the fundamental concepts needed. For a more detailed discussion, see the referenced sections of the book.

i

i i

i

i

i

i

10.4. Some Concepts from Nonlinear Optimization

book 2008/10/23 page 335 i

335

We start with the problem of minimizing an unconstrained function of n variables f (x). At any local minimizer x∗ the gradient (the vector of all partial derivatives) of f must satisfy ∇f (x∗ ) = 0. If in addition the matrix of second derivatives ∇ 2 f (x∗ ) is positive definite, then x∗ is a strict local minimizer of f . (See Chapter 11.) We will also be interested in minimizing a function subject to linear equality constraints. Consider the problem of minimizing a function f subject to m constraints of the form aiTx = bi , that is, minimize f (x) subject to Ax = b. To find the optimum we introduce an auxiliary function, L(x, λ) = f (x) −

m

λi (aiTx − bi ) = f (x) − λT(Ax − b),

i=1

called the Lagrangian. The variables λi are called the Lagrange multipliers, and, in the case of linear programming, correspond to the dual variables. For any optimal point x∗ there exist values of λ1 , . . . , λm for which the gradient of the Lagrangian is zero. Thus the first-order optimality conditions can be written as ∇f (x∗ ) − ATλ = 0 Ax∗ = b. More detail is given in Chapter 14. The next concept is Newton’s method for the solution of a system of nonlinear equations. Given a guess xk of the solution, Newton’s method replaces the nonlinear functions at xk + x by their linear approximation, obtained from the Taylor series, and solves the resulting linear system. The solution x is called the Newton direction and the resulting point xk + x will be the new guess of the solution of the nonlinear system. See Section 2.7.1 for further details. An analogous idea is used in the minimization of an unconstrained function f (x). Any local minimizer will satisfy ∇f (x) = 0. The Newton direction is obtained by replacing the components of the gradient at xk by their linear approximation obtained from the Taylor series. This leads to the linear system of equations ∇ 2 f (xk ) x = −∇f (xk ), and the solution is the Newton direction. See Section 11.3. We can also give an alternative interpretation of Newton’s method. The method approximates f (x + x) by a quadratic function around f (xk ) and then finds the step xk that minimizes the quadratic approximation. Ignoring a constant term, we find that the resulting minimization problem is minimize 12 x∇ 2 f (xk ) x + ∇f (xk )T x. In the case where the function to be minimized is subject to linear constraints Ax = b and the current guess xk satisfies Axk = b, a projected Newton search direction can be computed. The direction minimizes the quadratic approximation above and lies in the null space of A, so that Aδx = 0. The final concept to be addressed is that of the logarithmic barrier method. We defer that to Section 10.6.

i

i i

i

i

i

i

336

book 2008/10/23 page 336 i

Chapter 10. Interior-Point Methods for Linear Programming

10.5 Affine-Scaling Methods Affine methods were proposed soon after the publication of Karmarkar’s method as a simplification of his method. It was later discovered, however, that the Russian scientist I. I. Dikin had proposed a primal affine method in 1967. Affine methods have been successful in solving large linear programs, although not quite as successful as the primal-dual path-following method. They are of interest because the directions they employ provide important insight into the search directions of path-following methods. Affine-scaling methods are the simplest interior-point methods, yet they are effective at solving large problems. These methods transform the linear program into an equivalent one in which the current point is favorably positioned for a constrained form of the steepestdescent method. Before we come to this idea, we discuss the search direction. Suppose that we are given some interior point for the primal problem. Since the nonnegativity constraints are nonbinding, we can move a small distance in a direction without violating these constraints. It would make sense to move in the steepest-descent direction −c along which the function value decreases most rapidly. To maintain feasibility of the constraints Ax = b, we project this direction onto the null space of A. When A has full rank, this is achieved by premultiplying the steepest-descent direction by the orthogonal projection matrix P = I − AT(AAT)−1 A. The resulting direction x = −P c is the projected steepest-descent direction. It is the feasible direction that produces the fastest rate of decrease in the objective (see the Exercises). If the current point is close to the center of the feasible region (as is the point xa in Figure 10.1), then considerable improvement could be made by moving in the projected steepest-descent direction. If the point is close to the boundary defined by the nonnegativity constraints, then possibly only a small step could be taken without losing feasibility, and thus little improvement achieved (see point xb in the figure.) The steepest-descent direction will be effective if the current point is close to the center of the feasible region. Motivated by this, affine methods transform the linear problem into an equivalent problem that has the current point in a more “central” position; a step is then made along the projected steepest-descent direction for the transformed problem. What is a “central” position? A plausible choice is the point e = (1, 1, . . . , 1)T, since all its variables are equally distant from their bounds. To transform the current point xk into the point e we simply scale the variables, dividing them by the components of xk . Let X = diag (xk ) be the n × n diagonal matrix whose diagonal entries are the components of xk . Then the scaling x¯ = X−1 x or equivalently x = X x¯ transforms the variables x into new variables x, ¯ with xk transformed into e. This transformation is an affine-scaling transformation, and X is the scaling matrix. Note that e = X−1 xk

and

xk = Xe.

i

i i

i

i

i

i

10.5. Affine-Scaling Methods

book 2008/10/23 page 337 i

337

x*

x* xb

xa

Figure 10.1. Steepest-descent from “central” and “noncentral” points. Suppose that the original problem in “x-space” is written as minimize

z = cTx

subject to

Ax = b x ≥ 0.

Then the transformed problem in “x-space” ¯ can be written as z = c¯Tx¯ subject to A¯ x¯ = b x¯ ≥ 0, minimize

where c¯ = Xc

and A¯ = AX.

Our current position in “x-space” ¯ is at the point e. We now make a move in the projected steepest-descent direction T T ¯ c¯ x¯ = −P¯ c¯ = −(I − A¯ (A¯A¯ )−1A)   T 2 T −1 = − I − XA (AX A ) AX Xc.

The step in the transformed space along x¯ yields x¯k+1 = e + α x, ¯ where α is a suitable step length. The final task in the iteration is to map x¯k+1 back to the original “x-space” to obtain xk+1 = X x¯k+1 . We now summarize the affine-scaling algorithm. In each iteration, (i) the problem in “x-space” is transformed via affine scaling into an equivalent problem in “x-space” ¯ so that the current point xk is transformed into the point e, (ii) an appropriate step is taken from e along the projected steepest-descent direction in “x-space,” ¯ and (iii) the resulting point in “x-space” ¯ is transformed back into the corresponding point in “x-space.” It is possible to express the algorithm entirely in terms of the original variables. To see this, note that xk+1 = X x¯k+1 = X(e + α x) ¯ = xk + αX x. ¯

i

i i

i

i

i

i

338

book 2008/10/23 page 338 i

Chapter 10. Interior-Point Methods for Linear Programming

Defining x = X x, ¯ we obtain xk+1 = xk + α x, where

  x = − X2 − X 2 AT(AX 2 AT)−1 AX 2 c = −X P¯ Xc

and P¯ = I −XAT(AX 2 AT)−1 AX is the orthogonal projection matrix for AX. The direction x is the primal affine-scaling direction. There are several ways to select the step length α. Because the function decreases at a constant rate along the search direction x, most implementations take as large a step as possible, stopping just short of the boundary. (On the boundary, some variable is zero and the method is not defined.) Commonly α is chosen as α = γ αmax , where αmax is the step to the boundary, and 0 < γ < 1; typically γ is set very close to 1, e.g., γ = 0.99. Since αmax is the largest step satisfying (xk )i + αmax xi ≥ 0,

i = 1, . . . , n,

its value is given by a ratio test αmax = min (−(xk )i / xi ). xi 0. One motivation for these equations is that they try to maintain primal feasibility, dual feasibility, and a perturbed complementary slackness condition. This was the viewpoint taken in Section 10.2.2, where we initially developed the primal-dual path-following algorithm. We can also motivate these equations from the perspective of the class of methods known as logarithmic barrier methods. This viewpoint can lead to further insight regarding the central path and also gives rise to a variety of new algorithms for solving the primal problem, and the dual problem, or the primal and dual problems simultaneously. Barrier methods handle inequality constraints gi (x) ≥ 0 in an optimization problem by removing them as explicit constraints, and instead, incorporating them into the objective as a “barrier term” that prevents the iterates from reaching  the boundary of these constraints. For the logarithmic barrier method the barrier term is − log(xi ). A nonnegative parameter μ controls the weight of the barrier and is gradually decreased to zero as the iterates approach the solution. Given a linear program in standard form (P), the logarithmic barrier method solves a sequence of problems of the form minimize x

subject to

βμ (x) = c x − μ T

Ax = b

n

j =1

log(xj )

(Pμ )

for a decreasing sequence of positive barrier parameters μ that approach zero. The equalities Ax = b can be handled explicitly by moving in the null space of the constraint matrix.

i

i i

i

i

i

i

10.6. Path-Following Methods

book 2008/10/23 page 345 i

345

Figure 10.2. Central path.  The objective, βμ (x) = cTx − μ log(xj ), will be referred to as the primal logarithmic barrier function. Its gradient and Hessian are ⎞ ⎞ ⎛ ⎛ 1/x 2 1/x1 1 .. ⎠. ∇βμ (x) = c − μ ⎝ ... ⎠ , ∇ 2 βμ (x) = μ ⎝ . 1/xn2

1/xn If we denote X = diag (x), then ∇βμ (x) = c − μX −1 e,

∇ 2 βμ (x) = μX−2 .

Let y denote the vector of Lagrange multipliers associated with the equality constraints of Pμ . Then the first-order optimality conditions are c − μX −1 e − ATy = 0 Ax = b. It can be shown that if both the primal problem and the dual problem have strictly feasible solutions, then the barrier subproblems have a unique solution x = x(μ) for every μ > 0, and that x(μ) converges to a solution of the primal problem as μ approaches zero. The central path or barrier trajectory for the primal problem is the set of points { x(μ) : μ > 0 }. This is illustrated in Figure 10.2. Let us take a closer look at the barrier trajectory. If we define s = c − ATy, then the first equation implies that s − μX −1 e = 0, or equivalently, Xs = μe. Thus, for each component we have xj sj = μ. Since xj is positive, sj is also positive, and s > 0. Thus, the multipliers y correspond to a dual feasible solution (y, s). Furthermore, when μ is small, the complementary slackness conditions are close to being satisfied—they are perturbed by μ. Denoting S = diag (s), the conditions can be written in an equivalent form that describes a primal-dual central trajectory: Ax = b ATy + s = c XSe = μ. For a given μ, the system may be regarded as a perturbation of the optimality conditions for a linear program: primal feasibility, dual feasibility, and perturbed complementarity

i

i i

i

i

i

i

346

book 2008/10/23 page 346 i

Chapter 10. Interior-Point Methods for Linear Programming

slackness. If we apply Newton’s method to this nonlinear system of equations, then we obtain the primal-dual algorithm introduced in Section 10.2. For completeness, we present again the search directions (in a slightly different form): x = −(D − DAT(ADAT)−1 AD)(c − μX −1 e) y = (ADAT)−1 (b − μAS −1 e) s = −AT(ADAT)−1 (b − μAS −1 e), where D = S −1 X. The primal-dual algorithm is therefore a path-following method. The primal variant of the method applies Newton’s method in a slightly different setting. It operates in a primal framework, updating and maintaining feasibility of the primal variables. The search direction at a point x is the projected Newton direction—the feasible direction x that minimizes the quadratic approximation to βμ at x. Denoting X = diag (x), the projected Newton direction solves the quadratic program minimize subject to

f ( x) = 21 x TμX −2 x + (c − μX −1 e)T x A x = 0.

Letting y be the vector of Lagrange multipliers for this problem, the first-order necessary conditions for optimality are μX−2 x + (c − μX −1 e) − ATy = 0 A x = 0. Multiplying the first equation on the left by (1/μ)X 2 , we obtain 1 x = − X 2 (c − μX −1 e − ATy). μ Multiplying on the left by A, and recalling that A x = 0, we obtain an expression for y: y = (AX2 AT)−1 AX 2 (c − μX −1 e). Defining s = c − ATy, the projected Newton direction is 1 1 x = − X 2 (s − μX −1 e) = x − X 2 s. μ μ Later we shall show that, as x converges to x∗ , the vector y converges to the optimal dual solution, and the vector s = c − ATy converges to the optimal dual slack vector. For this reason we refer to (y, s) as the “dual estimates” at x. Example 10.4 (Primal Path-Following Method). Consider again the problem in Example 10.1. We will compute the search direction generated by the primal path-following method at the initial point x = (0.5, 0.5, 2.5, 6.5, 2.5)T. We use μ = 10. Then ⎛ ⎞ ⎛ ⎞⎛ ⎞ ⎛ ⎞ −1 2 0 0 0 0 1 −21.000 0 0 ⎟ ⎜ 1 ⎟ ⎜ −22.000 ⎟ ⎜ −2 ⎟ ⎜0 2 0 ⎜ ⎟ ⎜ ⎟⎜ ⎟ ⎜ ⎟ c − μX −1 e = ⎜ 0 ⎟ − 10 ⎜ 0 0 0.4 0 0 ⎟ ⎜ 1 ⎟ = ⎜ −4.000 ⎟ . ⎝ ⎠ ⎝ ⎠⎝ ⎠ ⎝ ⎠ 0 0 0 0 0.1539 0 1 −1.539 0 0 0 0 0 0.4 1 −4.000

i

i i

i

i

i

i

10.6. Path-Following Methods Since



AX =

−1 0.5 −0.5 1 0.5 0

2.5 0 0 0 6.5 0 0 0 2.5

347



 and

AX A = 2

T

we obtain  y = (AX2 AT)−1 AX 2 (c − μX −1 e) =

and

book 2008/10/23 page 347 i

−2.7832 −1.5908 −4.9291

7.50 1.00 −0.50

1.00 43.50 −0.25

−0.50 −0.25 6.50

 ,



⎞ −3.2280 ⎜ 3.9647 ⎟ ⎜ ⎟ s = c − ATy = ⎜ 2.7832 ⎟ , ⎝ ⎠ 1.5908 4.9291

 ,



⎞ 0.5807 ⎜ 0.4009 ⎟ ⎜ ⎟ x = X x¯ = ⎜ 0.7605 ⎟ . ⎝ ⎠ −0.2211 −0.5807 We now re-examine the search direction x. We can write it as 1 x = − X 2 (c − ATy − μX −1 e) μ  1 = − X2 − X 2 AT(AX 2 AT)−1 AX 2 (c − μX −1 e) μ 1 1 = − X P¯ X(c − μX −1 e) = − X P¯ Xc + X P¯ e, μ μ

where P¯ = I − XAT(AX 2 AT)−1 AX is the orthogonal projection matrix corresponding to AX. This final expression is a sum of two directions: the first is a multiple of the primal affine-scaling direction; the second, X P¯ e, is called a centering direction, for reasons we shall explain. Almost all primal interior-point methods move in a direction that is some combination of these two directions. (Similar observations can be made for dual methods as well as primal-dual methods.) As μ goes to zero, the contribution of the affine-scaling direction becomes increasingly dominant. Thus the limiting direction when μ approaches zero is the affine scaling direction. The centering direction is the Newton direction for the problem minimize subject to

f (x) = − Ax = b.

n

log xj

j =1

This problem finds the “analytic center” of the feasible region, the point “farthest away” * from all boundaries, in the sense that the product xj is maximal. We now briefly describe the polynomial algorithms that use these search directions. In general, path-following algorithms attempt to move along the barrier trajectory. The strategy is to choose an initial parameter μ = μ0 , find an approximate solution to the appropriate subproblem (Pμ in the primal case), reduce μ (usually by some specified fraction),

i

i i

i

i

i

i

348

book 2008/10/23 page 348 i

Chapter 10. Interior-Point Methods for Linear Programming

√ and repeat. The best complexity bound on the number of iterations is currently O( nL) iterations, for “short-step” algorithms. In such methods the iterates are confined to a small region around the barrier trajectory, so that one iteration of Newton’s method will typically suffice to obtain a “near solution” to Pμ . To prevent the iterates from straying too far from the trajectory, the barrier parameter μ can be reduced only by a small amount, typically by √ (1−γ / n), for some appropriate constant γ > 0. “Long-step” methods allow their iterates to lie in a wider neighborhood of the barrier trajectory and reduce the barrier parameter more rapidly. They may require more than one Newton iteration to obtain a “near solution” to Pμ . For such methods, the best complexity bound on the number of iterations is currently O(nL) iterations. To conclude this section, we present a variant of the short-step primal logarithmic √ barrier algorithm and prove that under appropriate assumptions it requires at most O( nL) iterations. A similar proof can be developed for the primal-dual version of the algorithm. The algorithm is a “theoretical algorithm”; details such as the step length and the strategy for reducing the barrier parameter must be modified to obtain a computationally efficient algorithm. The algorithm proceeds as follows. Given a strictly feasible point x, a positive barrier parameter μ, and some tolerance  > 0, do the following: 1. Compute y = (AX2 AT)−1 AX 2 (c − μX −1 e),

s = c − ATy.

2. If s ≥ 0 and x Ts ≤ , stop—a solution has been found. 3. Let 1 x = x − X 2 s. μ Set x+ = x + x. Set μ = θμ, where 0 < θ < 1, and repeat. To establish the polynomial complexity of the algorithm, we define a measure of proximity to the central trajectory. We show that, if a point is “sufficiently close” to the trajectory (using our measure of proximity), then the Newton step will lead to a feasible point with a guaranteed √ reduction in the duality gap. We also show that, if μ decreases by a factor of (1 − γ / n) for an appropriate value of γ (here we use γ = 1/6), then the new point will also be “sufficiently close” to the trajectory. What is a good measure of proximity to the barrier trajectory? For a given value of μ, x is “near” the trajectory if, for some dual slack vector s, the components of xj sj are approximately equal to μ. Here “approximately equal” is defined relative to μ. This leads to the following measure of proximity at a point x:    Xs   : ATy + s = c, y ∈ m . δ(x, μ) = min  − e   s μ The choice of norm √ in this definition is crucial. If the 2-norm is used, it is possible to obtain a complexity of O( nL) steps. However if a “looser” ∞-norm is used, then typically the algorithm has a complexity of O(nL) iterations. (Despite this inferior complexity, however, algorithms that are based on the ∞-norm can have better performance.)

i

i i

i

i

i

i

10.6. Path-Following Methods

book 2008/10/23 page 349 i

349

In the following we use the stricter 2-norm for our measure of proximity. The measure can then be written more conveniently as   δ(x, μ) = X−1 x  since    Xs   : ATy + s = c, y ∈ m δ(x, μ) = min  − e μ 

= μ−1 min Xs − μe,  : ATy + s = c, y ∈ m  

= μ−1 min X(c − ATy) − μe : y ∈ m 

 = μ−1 min (Xc − μe) − XATy  : y ∈ m     = μ−1 P¯ (Xc − μe) = X −1 x  . The vectors y and s that solve the least-squares problem are the dual estimates at x obtained from computing x (see the Exercises). We now prove that under appropriate assumptions the path-following algorithm described here has polynomial complexity. We shall analyze the properties of the algorithm in a sequence of lemmas and then combine them to prove the final complexity theorem. Within the proof, we define a “scaled complementarity” vector t=

Xs , μ

whose components are tj = xj sj /μ. Using this notation, the proximity measure can be expressed as 

1/2 n 2 δ(x, μ) = t − e = (tj − 1) . j =1

We start by showing that if δ(x, μ) < 1, the points generated by applying Newton’s method to solve Pμ are feasible, and their proximity measure decreases quadratically. Lemma 10.5 (Quadratic Reduction in Proximity Measure). Let x be strictly feasible for the primal problem, and let x+ = x + x. If δ(x, μ) < 1, then x+ is strictly feasible and δ(x+ , μ) ≤ δ(x, μ)2 . Proof. First we prove that x+ is feasible. Since Ax = b and A x = 0, it follows that Ax+ = b, so we need only show that x+ > 0. To prove this we write x+ = x + x = X(e + X−1 x). Now by assumption δ(x, μ) = X−1 x < 1, and hence each component of X−1 x is less than 1 in absolute value. It follows that e + X −1 x > 0, and consequently x+ > 0. To prove that δ(x+ , μ) ≤ δ(x, μ)2 we first note that        X+ s¯   : ATy¯ + s¯ = c ≤  X+ s − e , δ(x+ , μ) = min  − e     s¯ μ μ

i

i i

i

i

i

i

350

book 2008/10/23 page 350 i

Chapter 10. Interior-Point Methods for Linear Programming

where X+ = diag (x+ ) and s is the dual slack estimate at x. Using the relation x+ = x + x = x + x −

1 2 1 X s = 2x − X 2 s, μ μ

and the relation Xs = Sx where S = diag (s), we obtain Sx+ 2Sx 2Xs SX 2 s (XS)(Xs) X+ s = = = − − . 2 μ μ μ μ μ μ2 Let t = Xs/μ and T = diag (t) = XS/μ. Then X+ s − e = 2t − T 2 e − e. μ Therefore δ(x+ , μ) ≤ 2

n

(2tj −

tj2

− 1) = 2

j =1

n

j =1

(tj − 1) ≤ 4



n

2 (tj − 1)

2

= δ(x, μ)4 ,

j =1

and consequently δ(x+ , μ) < δ(x, μ)2 . Thus, if δ(x, μ) < 1, then the point x is “close” to the minimizer of Pμ , and each iteration of Newton’s method will decrease the proximity measure at least quadratically. The next lemma gives a bound on the proximity measure of x with respect to a new (reduced) value of the barrier parameter μ . Lemma 10.6 (Proximity of x for Reduced μ). Let μ = θμ with 0 < θ ≤ 1. Then δ(x, μ ) ≤

√  1 δ(x, μ) + (1 − θ) n . θ

Proof. From the definition of the proximity measure we have        X s¯       : ATy¯ + s¯ = c ≤  Xs − e =  t − e , − e δ(x, μ ) = min        s¯ μ μ θ where s is the dual slack estimate at x for barrier parameter μ, and t = Xs/μ. Applying the triangle inequality, we obtain 1 1 (t − e) + (1 − θ)e ≤ t − e + (1 − θ) e θ θ √  1 δ(x, μ) + (1 − θ) n . ≤ θ

δ(x, μ ) ≤

We now combine the results of the previous two lemmas to obtain a bound on the proximity measure of a point obtained by a Newton step and for a new value of the barrier parameter. In particular, if δ(x, μ) ≤ 12 , and the reduction in μ is sufficiently conservative (that is, θ is sufficiently close to 1), then δ(x+ , μ ) ≤ 12 also.

i

i i

i

i

i

i

10.6. Path-Following Methods

book 2008/10/23 page 351 i

351

Lemma 10.7 (Bounded Proximity Measure). Let x be strictly feasible for the primal problem, and suppose that δ(x, μ) ≤ 21 . Let x+ = x + x, and suppose that μ = θμ. If √ θ ≥ (1 − 1/(6 n)), then δ(x+ , μ ) ≤ 12 . Proof. Applying Lemmas 10.5 and 10.6 successively, we obtain √  1 δ(x+ , μ) + (1 − θ) n θ √  1 ≤ δ(x, μ)2 + (1 − θ) n θ  1 1 1 5 1 ≤ + = ≤ . θ 4 6 12θ 2 √ 5 The last inequality follows since θ ≥ 1 − 1/6 n ≥ 6 . δ(x+ , μ ) ≤

From the preceding lemmas we can conclude that if we have a strictly feasible point x0 and a barrier parameter μ0 satisfying δ(x0 , μ0 ) ≤ 12 , then the sequence of iterates (xk , μk ) obtained by repeatedly taking a single Newton step, and reducing μ by a factor of √ (1 − 1/(6 n)), is strictly feasible and maintains a proximity measure δ(xk , μk ) ≤ 12 . Will this sequence converge to an optimal solution as μ goes to zero? The next lemma will help answer this question. It provides bounds on the duality gap at a point x in terms of μ and δ(x, μ). Lemma 10.8 (Bounded Duality Gap). Let x be strictly feasible for the primal problem, and let (y, s) be the dual estimates at x with respect to μ. If δ(x, μ) ≤ δ ≤ 1, then (y, s) is dual feasible, and √ √ μ(n − δ n) ≤ cTx − bTy ≤ μ(n + δ n). Proof. By definition, ATy + s = c, and hence we need only show that s ≥ 0. Now by assumption,    Xs   δ(x, μ) =  − e  ≤ 1, μ and hence each component of Xs − e is at most 1 in absolute value. This implies that μ xj sj ≥ 0 for all j , and since x > 0, it follows that s ≥ 0. Because x is feasible to the primal and (y, s) is feasible to the dual, cTx − bTy = x Ts. Now 1 1 x = x − X 2 s = Xe − X 2 s, μ μ and hence s = μX−1 (e − X −1 x). Consequently, the duality gap is x Ts = μx TX −1 (e − X −1 x) = μeT(e − X −1 x) = μ(n − eTX −1 x), so that

      μ n − e X−1 x  ≤ x Ts ≤ μ n + e X−1 x  .

i

i i

i

i

i

i

352

book 2008/10/23 page 352 i

Chapter 10. Interior-Point Methods for Linear Programming

  Since X −1 x  = δ(x, μ) ≤ δ, we obtain the desired result: √ √ μ(n − δ n) ≤ x Ts ≤ μ(n + δ n). It follows from the lemma that as the barrier parameter goes to zero, the iterates converge to the optimal solution. The final theorem gives an upper bound on the number of iterations required by the algorithm. Theorem 10.9 (Complexity of the Short-Step Algorithm). Assume that the short-step algorithm is initialized with x0 and μ0 > 0, so that δ(x0 , μ0 ) < 12 . Assume that at each iteration a single Newton step √ is taken and that the barrier parameter is updated as μk+1 = θμk , where θ = (1 − 1/(6 n)). Then the number of √ iterations required to find a solution with a duality gap of at most  is bounded above by 6 nM, where M = log(1.5nμ0 /). Proof. After the kth iteration we will have μk = θ k μ0 . Let x be the point obtained and y the corresponding dual estimate. The previous lemmas imply that x is primal feasible, y is dual feasible, and   √  √ k cTx − bTy ≤ μk n + δ(x, μk ) n ≤ μk 1.5n = 1.5nμ0 1 − 1/(6 n) . Thus, the algorithm will have terminated if  √ k 1.5nμ0 1 − 1/(6 n) ≤ , or equivalently, if

 √  k log 1 − 1/(6 n) ≤ − log(1.5nμ0 /).

This condition implies that

 √  −k log 1 − 1/(6 n) ≥ M.

Since − log(1 α < 1 (see the Exercises), this inequality will certainly √ − α) ≥ α for all 0 < √ hold if k/6 n ≥ M, that is, if k ≥ 6 nM. Thus we have the required bound on the number of iterations. It can be shown (see Papadimitriou and Steiglitz (1982, reprinted 1998)) that if the objective values of a primal feasible solution and a dual feasible solution differ by less than 2−2L , then the objective values must be equal, so the solutions must be optimal to the primal and dual problems, respectively. Consequently, if skTxk < 2−2L , then the optimal solution has been found. Assuming that μ0 = 2O(L) , we obtain that √ M = O(L), and hence the number of iterations required for termination is at most O( nL). (For this choice of μ0 , initialization procedures for the algorithm exist.)

Exercises 6.1. Write down the first-order optimality conditions for the dual logarithmic barrier problem. Prove that they are equivalent to the perturbed optimality conditions solved by the primal-dual algorithm.

i

i i

i

i

i

i

10.7. Notes

book 2008/10/23 page 353 i

353

6.2. Prove that the centering direction is the solution to the problem minimize

n

log xj f (x) = −

subject to

Ax = b.

j =1

6.3. Note that it is also possible to define a dual logarithmic barrier method—a barrier method that operates on the dual problem. The method solves a sequence of problems maximize y,s

subject to

f (y, s) = b y + μ T

AT y + s = c

n

log(sj )

j =1

for a decreasing sequence of barrier parameters. Do the following: (i) Derive the first-order optimality conditions for this problem and prove that the points satisfying these conditions are on the primal-dual central path. (ii) The dual method moves in the projected Newton direction for this problem. Prove that this direction is given by y =

1 (AS −2 AT)−1 b − (AS −2 AT)−1 AS −1 e, μ

where s = −AT y. 6.4. The analytic center for the dual problem is the point that solves minimize f (y) = −

n

log(c − ATy)j .

j =1

Find an expression for the Newton direction at a point y for the problem of finding the analytic center of the dual. This direction is called the dual centering direction. Prove that the projected Newton direction for the dual logarithmic barrier method is a combination of the dual affine direction and the dual centering direction. 6.5. Prove that − log(1 − α) ≥ α for all 0 < α < 1.

10.7

Notes

Interior-Point Methods—The book by Fiacco and McCormick (1968, reprinted 1990) is a “classical” reference to interior-point methods for nonlinear optimization. See also our Chapter 16. The books by den Hertog (1994), Roos et al. (2005), Vanderbei (2007), Wright (1997), and Ye (1997) provide comprehensive overviews of interior-point methods for linear programming. The developments in interior-point methods for linear programming have been extended to wider classes of convex programming. See Sections 16.7 and 16.8. Karmarkar’s Method—In his original paper Karmarkar considered a primal problem in standard form with an additional normalizing constraint eTx = 1. He showed that all

i

i i

i

i

i

i

354

book 2008/10/23 page 354 i

Chapter 10. Interior-Point Methods for Linear Programming

linear programs can be transformed into this specific form, but the proposed transformation results in a much larger linear program. Variants of the method that are suitable for problems in standard form were proposed by Anstreicher (1986), Gay (1987), and Ye and Kojima (1987). A description of Karmarkar’s method is available on the Web page for this book at http://www.siam.org/books/ot108. √ Path-Following Methods—The first path-following method, which was also the first O( nL) algorithm for linear programming, was developed by Renegar (1988). The development of primal-dual path-following methods was motivated by the 1986 paper by Megiddo. The first polynomial primal-dual path-following algorithms were proposed by Kojima, Mizuno, and Yoshise (1989) and Monteiro and Adler (1989). Kojima, Mizuno, and Yoshise used an ∞-norm proximity measure to obtain an √O(nL) algorithm, while Monteiro and Adler used a 2-norm measure to obtain an O( nL) algorithm. The particular primal-dual method presented in Section 10.2 is based on the paper by Monteiro and Adler. The proof of polynomiality for the primal path-following method presented in Section 10.6 follows the article by Roos and Vial (1992). The predictor-corrector method is described in the paper of Mehrotra (1992). The convergence behavior of the method in degenerate cases is discussed in the paper by Güler and Ye (1993). Many software packages for linear programming include an enhancement of the method proposed by Gondzio that allows efficient use of higher-order predictor and corrector terms. A polynomial predictor-corrector primal-dual path-following algorithm is given in the paper by Mizuno, Todd, and Ye (1993). √ If proximity is measured using a 2-norm, the algorithm has a complexity bound of O( nL) iterations. A predictor-corrector algorithm based on an ∞-norm is given in the paper by Anstreicher and Bosch (1995). The algorithm requires at most O(L) “predictor” steps, and each of those requires at most O(n) “corrector” or centering steps, so that the algorithm requires at most O(nL) steps. The paper by Zhang and Tapia (1992) shows that the centering parameter and the step length in a primal-dual path-following method can be chosen so that both polynomiality and superlinear convergence are achieved. Further, if the solution is nondegenerate, the rate of convergence is quadratic. (When referring to “convergence rates” we assume that the method takes an infinite number of steps to converge.) The algorithm asymptotically uses the affine-scaling direction (the centering parameter—the coefficient of the centering direction—tends to zero) and allows the iterates to be close to the boundary. These features have also been observed to give good practical performance. Computational Issues— A discussion of computational issues for interior-point methods can be found in the papers by Lustig, Marsten, and Shanno (1992, 1994a). Further developments are in the 1996 paper by Andersen et al. Self-Dual Formulations—The concept of a self-dual linear program was introduced by Tucker (1956). The idea of embedding a linear program in a self-dual problem was proposed in the paper by Ye, Todd, and Mizuno (1994) and, in a simplified form, in the paper by Xu, Hung, and Ye (1993). Affine-Scaling Methods—The primal affine-scaling method was proposed by Barnes (1986) and Vanderbei, Meketon, and Freedman (1986). Subsequently it was found that the method had already been proposed 12 years earlier by Dikin (1974), a student of Kantorovich.

i

i i

i

i

i

i

book 2008/10/23 page 355 i

Part III

Unconstrained Optimization

i

i i

i

i

book 2008/10/23 page 356 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 357 i

Chapter 11

Basics of Unconstrained Optimization

11.1

Introduction

In this chapter we begin studying the problem minimize f (x), where no constraints are placed on the variables x = (x1 , . . . , xn )T. Unconstrained problems arise, for example, in data fitting (see Section 1.5), where the objective function measures the difference between the model and the data. Methods for unconstrained problems are of more general value, though, since they form the foundation for methods used to solve constrained optimization problems. We will derive several optimality conditions for the unconstrained optimization problem. One of these conditions, the “first-order necessary condition,” consists of a system of nonlinear equations. Applying Newton’s method to this system of equations will be our fundamental technique for solving unconstrained optimization problems. When started “close” to a solution, Newton’s method converges rapidly. At an arbitrary starting point, however, Newton’s method is not guaranteed to converge to a minimizer of the function f and must be refined before an acceptable algorithm can be obtained. Such refinements are described in the latter part of the chapter. These refinements can be used to ensure that Newton’s method as well as other optimization methods converge from any starting point.

11.2

Optimality Conditions

We will derive conditions that are satisfied by solutions to the problem minimize f (x). The conditions for the problem maximize f (x) are analogous and will be mentioned in passing. 357

i

i i

i

i

i

i

358

book 2008/10/23 page 358 i

Chapter 11. Basics of Unconstrained Optimization

Let x∗ denote a candidate solution to the minimization problem. In Chapter 2 we defined global solutions to optimization problems. The definition of a global optimum does not have much computational utility since it requires information about the function at every point, whereas the algorithms in common use will only have information about the function at a finite set of points. Even if the global minimizer x∗ were given to us, it would be difficult or impossible to confirm that it was indeed the global minimizer. (See the Notes in Chapter 2.) It is easier to look for local minimizers. A local minimizer is a point x∗ that satisfies the condition f (x∗ ) ≤ f (x) for all x such that x − x∗  < , where  is some (typically small) positive number whose value may depend on x∗ . Similarly defined is a strict local minimizer: f (x∗ ) < f (x)

for all x such that 0 < x − x∗  < .

It is possible for a function to have a local minimizer and yet have no global minimizer. It is also possible to have neither global nor local minimizers, to have both global and local minimizers, to have multiple global minimizers, and various other combinations. (See the Exercises.) In this form, these conditions are no more practical than those for a global minimizer, since they too require information about the function at an infinite number of points, and the algorithms will only have information at a finite number of points. However, with additional assumptions on the function f , practical optimality conditions can be obtained. To obtain more practical conditions, we assume that the function f is differentiable and that its first and second derivatives are continuous in a neighborhood of the point x∗ . Not all the conditions that we derive will require this many derivatives, but it will simplify the discussion if the assumptions do not change from condition to condition. (A more precise discussion can be found in the book by Ortega and Rheinboldt (1970, reprinted 2000).) All of these conditions will be derived using Taylor series expansions of f about the point x∗ . Suppose that x∗ is a local minimizer of f . Consider the Taylor series with remainder term (see Section 2.6) f (x∗ + p) = f (x∗ ) + ∇f (x∗ )Tp + 12 p T∇ 2 f (ξ )p, where p is a nonzero vector and ξ is a point between x and x∗ . We will show that ∇f (x∗ ) = 0. If x∗ is a local minimizer, there can be no feasible descent directions at x∗ (see Section 2.2). Hence ∇f (x∗ )Tp ≥ 0 for all feasible directions p. For an unconstrained problem, all directions p are feasible, and so the gradient at x∗ must be zero; see the Exercises. Thus, if x∗ is a local minimizer of f , then ∇f (x∗ ) = 0. A point satisfying this condition is a stationary point of the function f . In the one-dimensional case, there is a geometric interpretation for this condition. If f is increasing at a point x, then f (x) > 0. Similarly if f is decreasing, then f (x) < 0.

i

i i

i

i

i

i

11.2. Optimality Conditions

book 2008/10/23 page 359 i

359

stationary points

Figure 11.1. Stationary points. Apoint where f is increasing or decreasing cannot correspond to a minimizer. At a minimizer the function will be flat or stationary, and hence f (x∗ ) = 0. This is illustrated in Figure 11.1. The condition ∇f (x∗ ) = 0 is referred to as the first-order necessary condition for a minimizer. The term “first-order” refers to the presence of the first derivatives of f (or to the use of the first-order term in the Taylor series to derive this condition). It is a “necessary” condition since if x∗ is a local minimizer, then it “necessarily” satisfies this condition. The condition is not “sufficient” to determine a local minimizer since a point satisfying ∇f (x∗ ) = 0 could be a local minimizer, a local maximizer, or a saddle point (a stationary point that is neither a minimizer nor a maximizer). Local minimizers can be distinguished from other stationary points by examining second derivatives. Consider again the Taylor series expansion at x = x∗ + p, but now using the result that ∇f (x∗ ) = 0: f (x) = f (x∗ + p) = f (x∗ ) + 12 p T∇ 2 f (ξ )p. We will show that ∇ 2 f (x∗ ) must be positive semidefinite. If not, then v T∇ 2 f (x∗ )v < 0 for some v. Then it is also true that v T∇ 2 f (ξ )v < 0 if ξ − x∗  is small. This is because ∇ 2 f is assumed to be continuous at x∗ . If p is chosen as some sufficiently small multiple of v, then the point ξ will be close enough to x∗ to guarantee (via the Taylor series) that f (x) < f (x∗ ), a contradiction. Hence if x∗ is a local minimizer, then ∇ 2 f (x∗ ) is positive semidefinite. This is referred to as the second-order necessary condition for a minimizer, with the “second-order” referring to the use of second derivatives or the second-order term in the Taylor series. There is also a second-order sufficient condition, “sufficient” to guarantee that x∗ is a local minimizer: If ∇f (x∗ ) = 0

and

∇ 2 f (x∗ ) is positive definite,

i

i i

i

i

i

i

360

book 2008/10/23 page 360 i

Chapter 11. Basics of Unconstrained Optimization

then x∗ is a strict local minimizer of f . If this condition is satisfied, then it is easy to modify the above argument to show that f (x) = f (x∗ + p) > f (x∗ ) for all 0 < p <  for some  > 0 as follows: We write down the Taylor series expansion about the point x∗ , taking into account that ∇f (x∗ ) = 0: f (x) = f (x∗ ) + 12 p T∇ 2 f (ξ )p. If ∇ 2 f (x∗ ) is positive definite and ∇ 2 f is continuous, then ∇ 2 f (ξ ) will also be positive definite if ξ − x∗  is sufficiently small. Since ξ − x∗  ≤ p we can choose  small enough to guarantee this. Hence the second term in the Taylor series will be positive and so f (x) > f (x∗ ), as desired. So far we have discussed only minimization problems. There is no fundamental difference between minimization and maximization problems because max f (x) = − min −f (x). As a result, the optimality conditions for a maximizer are analogous to those for a minimizer. The necessary conditions state that if x∗ is a local maximizer, then ∇f (x∗ ) = 0

∇ 2 f (x∗ ) is negative semidefinite.

and

The sufficient conditions state that if ∇f (x∗ ) = 0

and

∇ 2 f (x∗ ) is negative definite,

then x∗ is a strict local maximizer. These optimality conditions are derived in the Exercises. Example 11.1 (Optimality Conditions). Consider the function f (x1 , x2 ) = 13 x13 + 12 x12 + 2x1 x2 + 12 x22 − x2 + 9. The condition for a stationary point is  ∇f (x) =

x12 + x1 + 2x2 2x1 + x2 − 1

 = 0.

The second component of this condition shows that x2 = 1 − 2x1 , and if this is substituted into the first component, we obtain x12 − 3x1 + 2 = 0 Hence there are two stationary points:   1 xa = −1 The Hessian matrix for the function is ∇ 2 f (x) =

or

(x1 − 1)(x1 − 2) = 0. 

and



xb =

2x1 + 1 2

2 1

2 −3

 .

 ,

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 361 i

361 f ( x) = x 3

f ( x) = x 4

f ( x) = - x 4

Figure 11.2. Limitations of optimality conditions. so

 ∇ f (xa ) = 2

3 2

2 1



 and

∇ f (xb ) = 2

5 2

2 1

 .

∇ 2 f (xb ) is positive definite, so xb is a local minimizer. However, ∇ 2 f (xa ) is indefinite, and xa is neither a minimizer nor a maximizer of f . This function has neither a global minimizer nor a global maximizer, since f is unbounded as x1 → ±∞. There is a slight gap between the necessary and sufficient conditions for a minimizer, the case where ∇f (x∗ ) = 0 and ∇ 2 f (x∗ ) is positive semidefinite. This gap represents a limitation of these conditions, as can be seen by considering the one-dimensional functions f1 (x) = x 3 , f2 (x) = x 4 , and f3 (x) = −x 4 . All three functions satisfy f (0) = f (0) = 0, and so x∗ = 0 is a candidate for a local minimizer. However, while f2 has a local minimum at x∗ = 0, f1 has only an inflection point, and f3 has a local maximum. This is illustrated in Figure 11.2. More complicated conditions involving higher derivatives are required to fill this gap between the necessary and sufficient conditions. The conditions given here require that ∇f (x∗ ) be exactly zero. For computer calculations this will almost never be true, and so these conditions must be adapted in a computer algorithm. This topic is discussed in Section 12.5.

Exercises 2.1. Consider the following function f (x) = 15 − 12x − 25x 2 + 2x 3 . (i) Use the first and second derivatives to find the local maxima and local minima of f . (ii) Show that f has neither a global maximum nor a global minimum.

i

i i

i

i

i

i

362

book 2008/10/23 page 362 i

Chapter 11. Basics of Unconstrained Optimization

2.2. Consider the function f (x) = 3x 3 + 7x 2 − 15x − 3. Find all stationary points of this function and determine whether they are local minimizers and maximizers. Does this function have a global minimizer or a global maximizer? 2.3. Consider the function f (x1 , x2 ) = 8x12 + 3x1 x2 + 7x22 − 25x1 + 31x2 − 29. Find all stationary points of this function and determine whether they are local minimizers and maximizers. Does this function have a global minimizer or a global maximizer? 2.4. Find the global minimizer of the function f (x1 , x2 ) = x12 + x1 x2 + 1.5x22 − 2 log x1 − log x2 . 2.5. Determine the minimizers/maximizers of the following functions: (i) f (x1 , x2 ) = x14 + x24 − 4x1 x2 . (ii) f (x1 , x2 ) = x12 − 2x1 x22 + x24 − x25 . (iii) f (x1 , x2 , x3 ) = x12 + 2x22 + 5x32 − 2x1 x2 − 4x2 x3 − 2x3 . 2.6. Find all the values of the parameter a such that (1, 0)T is the minimizer or maximizer of the function f (x1 , x2 ) = a 3 x1 ex2 + 2a 2 log(x1 + x2 ) − (a + 2)x1 + 8ax2 + 16x1 x2 . 2.7. Consider the problem minimize f (x1 , x2 ) = (x2 − x12 )(x2 − 2x12 ). (i) Show that the first- and second-order necessary conditions for optimality are satisfied at (0, 0)T. (ii) Show that the origin is a local minimizer of f along any line passing through the origin (that is, x2 = mx1 ). (iii) Show that the origin is not a local minimizer of f (consider, for example, curves of the form x2 = kx12 ). What conclusions can you draw from this? 2.8. Consider the problem minimize f (x) = (x1 − 2x2 )2 + x14 . Find the minimizer of f . Determine that the second-order necessary condition for a local minimizer is satisfied at this point. Is the second-order sufficient condition satisfied? Is this point a strict local minimizer? Is it a global minimizer?

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 363 i

363

2.9. Let f (x) = 2x12 + x22 − 2x1 x2 + 2x13 + x14 . Determine the minimizers/maximizers of f and indicate what kind of minima or maxima (local, global, strict, etc.) they are. 2.10. Let f (x) = cx12 + x22 − 2x1 x2 − 2x2 , where c is some scalar. (i) Determine the stationary points of f for each value of c. (ii) For what values of c can f have a minimizer? For what values of c can f have a maximizer? Determine the minimizers/maximizers corresponding to such values of c and indicate what kind of minima or maxima (local, global, strict, etc.) they are. 2.11. Consider the following unconstrained problem: minimize f (x) = x12 − x1 x2 + 2x22 − 2x1 + ex1 +x2 . (i) Write down the first-order necessary conditions for optimality. (ii) Is x = (0, 0)T a local optimum? If not, find a direction p along which the function decreases. (iii) Attempt to minimize the function starting from x = (0, 0)T along the direction p that you have chosen in part (ii). [Hint: Consider F (α) = f (x + αp).] 2.12. Consider the following problem: minimize f (x) = (x1 − 2)2 + (x2 − 3)2 + 1. Solve this problem. Consider now the problems below: Do they all have the same optimal point? If not, explain why not. (i) minimize f (x) = (x1 − 2)2 + (x2 − 3)2 + 1. (ii) minimize f (x) = (x1 − 2)2 + (x2 − 3)2 . (iii) minimize f (x) = (x1 − 2)2 + (x2 − 3)2 . 2.13. Consider the quadratic function f (x) = 12 x TQx − cTx. (i) Write the first-order necessary condition. When does a stationary point exist? (ii) Under what conditions on Q does a local minimizer exist? (iii) Under what conditions on Q does f have a stationary point, but no local minima nor maxima? 2.14. Consider the problem minimize f (x) = Ax − b22 , where A is an m × n matrix with m ≥ n, and b is a vector of length m. Assume that the rank of A is equal to n.

i

i i

i

i

i

i

364

book 2008/10/23 page 364 i

Chapter 11. Basics of Unconstrained Optimization (i) Write down the first-order necessary condition for optimality. Is this also a sufficient condition? (ii) Write down the optimal solution in closed form.

2.15. Give examples of functions that have the following properties: (i) (ii) (iii) (iv)

f f f f

has a local minimizer but no global minimizer. has neither global nor local minimizers. has both global and local minimizers. has multiple global minimizers.

2.16. Give an example of a differentiable function on 2 which has infinitely many minimizers but not a single maximizer. 2.17. Give an example of a differentiable function on 2 which has just one stationary point: the local but not the global minimizer. 2.18. Define the terms global maximizer, strict global maximizer, local maximizer, and strict local maximizer in analogy with the corresponding terms for minimizers. 2.19. State and prove the first-order necessary condition for a local maximizer of a function. 2.20. State and prove the second-order necessary condition for a local maximizer of a function. 2.21. State and prove the second-order sufficient condition for a local maximizer of a function. 2.22. Prove that, if f is convex, then any stationary point is also a global minimizer. 2.23. If x∗ is a local minimizer of a function f , then ∇f (x∗ )Tp ≥ 0

for all feasible directions p.

Prove that, for an unconstrained problem, the only way that this condition can be satisfied is if the gradient at x∗ is zero.

11.3

Newton’s Method for Minimization

In this section we present Newton’s method in its most basic or “classical” form. In later sections we will show how the method can be adjusted to guarantee that the search directions are descent directions, to guarantee convergence, and to lower the costs of the method. As presented in Chapter 2, Newton’s method is an algorithm for finding a zero of a nonlinear function. To use Newton’s method for optimization, we apply it to the first-order necessary condition for a local minimizer: ∇f (x) = 0. Since the Jacobian of ∇f (x) is ∇ 2 f (x), this leads to the formula xk+1 = xk − [∇ 2 f (xk )]−1 ∇f (xk ).

i

i i

i

i

i

i

11.3. Newton’s Method for Minimization

book 2008/10/23 page 365 i

365

Newton’s method is often written as xk+1 = xk + pk , where pk is the solution to the Newton equations: [∇ 2 f (xk )]p = −∇f (xk ). This emphasizes that the step pk is usually obtained by solving a linear system of equations rather than by computing the inverse of the Hessian. Newton’s method was derived in Chapter 2 by finding a linear approximation to a nonlinear function via the Taylor series. The formula for Newton’s method represents a step to a zero of this linear approximation. For the nonlinear equation ∇f (x) = 0 this linear approximation is ∇f (xk + p) ≈ ∇f (xk ) + ∇ 2 f (xk )p. The linear approximation is the gradient of the quadratic function qk (p) ≡ f (xk ) + ∇f (xk )Tp + 12 p T∇ 2 f (xk )p. qk (p) corresponds to the first three terms of a Taylor series expansion for f about the point xk . The quadratic function qk provides a new interpretation of Newton’s method for minimizing f . At every iteration Newton’s method approximates f (x) by qk (p), the first three terms of its Taylor series about the point xk ; minimizes qk as a function of p; and then sets xk+1 = xk + p. Hence at each iteration we are approximating the nonlinear function by a quadratic model. It is this point of view that we shall prefer. As might be expected, Newton’s method has a quadratic rate of convergence except in “degenerate” cases; it can sometimes diverge or fail. If Newton’s method converges, it will converge to a stationary point. In the form that we have presented it (the “classical” Newton formula) there is nothing in the algorithm to bias it towards finding a minimum, although that topic will be discussed in Section 11.4. Newton’s method is rarely used in its classical form. The method is altered in two general ways: to make it more reliable and to make it less expensive. We have already seen that Newton’s method can diverge or fail, and even if it does converge, it might not converge to a minimizer. By embedding Newton’s method inside some sort of auxiliary strategy it will be possible to guarantee that the method will converge to a stationary point and possibly a local minimizer, if one exists. One approach is to use the Newton direction within our general optimization algorithm (see Section 2.4), so that the new point is defined as xk+1 = xk + αk pk , where αk is a scalar chosen so that f (xk+1 ) < f (xk ). (In the classical Newton’s method, αk = 1 at every iteration, and there is no guarantee that the function value is decreased.) There are three types of costs associated with using Newton’s method: derivatives, calculations, and storage. In its classical form, Newton’s method requires second derivatives, the solution of a linear system, and the storage of a matrix. For an n-variable problem, there are O(n2 ) entries in the Hessian matrix, meaning that O(n2 ) expressions must be programmed to compute these derivatives. Many people find it tedious to derive and program these formulas; it is easy to make errors that can cause the optimization algorithm to perform poorly or even fail. Once the Hessian matrix has been found, it costs O(n3 ) arithmetic

i

i i

i

i

i

i

366

book 2008/10/23 page 366 i

Chapter 11. Basics of Unconstrained Optimization

operations to solve the linear system in the Newton formula. Also, normally the Hessian matrix will have to be stored at a cost of O(n2 ) storage locations. As n increases, these costs grow rapidly. Some of these concerns can be ameliorated. For example, it is possible to automate the derivative calculations (see Section 12.4). Also, many large problems have sparse Hessian matrices, and the use of sparse matrix techniques can reduce the storage and computational costs of using Newton’s method (see Appendix A.6). Alternatively, it is possible to reduce these costs by using algorithms that compromise on Newton’s method. Virtually all of these algorithms get by with only first derivative calculations. Most of these algorithms avoid solving a linear system and reduce the cost of using the Newton formula to O(n2 ) or less. The methods designed for solving large problems reduce the storage requirements to O(n). Some of these compromises will be discussed in Chapters 12 and 13. These compromises do not come without penalties. The resulting algorithms have slower rates of convergence and tend to use more, but cheaper, iterations to solve problems. Since Newton’s method is almost never used in its classical form, why is this classical form presented here with such prominence? The reason is that Newton’s method represents an “ideal” method for solving minimization problems. It may sometimes fail, and it may be too expensive to use routinely. Other algorithms strive to overcome its deficiencies while retaining its good properties, in particular, while retaining as rapid a rate of convergence as possible. It can be confusing to study all the various methods that have been proposed for solving unconstrained minimization problems. However, if it is remembered that virtually all of them are compromises on Newton’s method, then the relationships among the methods become clearer, and their relative merits become easier to understand. If Newton’s method is used, the theorem below shows that under appropriate conditions the convergence rate will be quadratic. Theorem 11.2 (Quadratic Convergence of Newton’s Method). Let f be a real-valued function of n variables defined on an open convex set S. Assume that ∇ 2 f is Lipschitz continuous on S, that is,  2  ∇ f (x) − ∇ 2 f (y) ≤ L x − y for all x, y ∈ S and for some constant L < ∞. Consider the sequence { xk } generated by xk+1 = xk − [∇ 2 f (xk )]−1 ∇f (xk ). Let x∗ be a minimizer of f (x) in S and assume that ∇ 2 f (x∗ ) is positive definite. If x0 − x∗  is sufficiently small, then { xk } converges quadratically to x∗ . Proof. See the Exercises. If a compromise to Newton’s method is used, we cannot normally expect to achieve such a rapid rate of convergence. It is still possible, however, to achieve superlinear convergence. This is the topic of the next theorem. The theorem shows that, to achieve superlinear convergence, the search direction must approach the Newton direction in the limit as the solution is approached.

i

i i

i

i

i

i

11.3. Newton’s Method for Minimization

book 2008/10/23 page 367 i

367

The theorem implicitly assumes that the Newton direction is defined at every iteration, that is, ∇ 2 f (xk ) is nonsingular for every k. This is not an essential assumption. The conclusion of the theorem is only of interest in the limit as x∗ is approached. Since ∇ 2 f (x∗ ) is assumed to be positive definite, the continuity of ∇ 2 f guarantees that ∇ 2 f (xk ) will be positive definite for all sufficiently large values of k. Theorem 11.3 (Superlinear Convergence). Let f be a real-valued function of n variables defined on an open convex set S. Assume that ∇ 2 f is Lipschitz continuous on S, that is,   2 ∇ f (x) − ∇ 2 f (y) ≤ L x − y for all x, y ∈ S and for some constant L < ∞. Consider the sequence { xk } generated by xk+1 = xk + pk . Suppose that { xk } ⊂ S,

lim xk = x∗ ∈ S,

k→∞

and that xk = x∗ for all k. Also suppose that ∇ 2 f (x∗ ) is positive definite. Then { xk } converges to x∗ superlinearly and ∇f (x∗ ) = 0 if and only if lim

k→∞

pk − (pN )k  = 0, pk 

where (pN )k is the Newton direction at xk . Proof. We give here an outline of the proof. Some details are left to the Exercises. We first prove the “if” part of the theorem, assuming that pk − (pN )k  = 0. k→∞ pk  lim

This is done in two stages, first showing that ∇f (x∗ ) = 0, and then showing that { xk } converges superlinearly. (i) ∇f (x∗ ) = 0: Since −∇f (xk ) = ∇ 2 f (xk )(pN )k and xk+1 − xk = pk , ∇f (xk+1 ) = [∇f (xk+1 ) − ∇f (xk ) − ∇ 2 f (xk )(xk+1 − xk )] +∇ 2 f (xk )[pk − (pN )k ]. Thus

  ∇f (xk+1 ) − ∇f (xk ) − ∇ 2 f (xk )(xk+1 − xk ) ∇f (xk+1 ) ≤ pk  pk   pk − (pN )k   2 . + ∇ f (xk ) pk 

From Theorem B.6 in Appendix B, it follows that   ∇f (xk+1 ) − ∇f (xk ) − ∇ 2 f (xk )(xk+1 − xk ) = O(pk 2 ).

i

i i

i

i

i

i

368

book 2008/10/23 page 368 i

Chapter 11. Basics of Unconstrained Optimization Hence, for some positive constant γ ,  pk − (pN )k   ∇f (xk+1 ) γ pk 2 ≤ lim + lim ∇ 2 f (xk ) = 0. k→∞ k→∞ pk  k→∞ pk  pk    (Note that ∇ 2 f (xk ) has a finite limit because of the continuity assumptions in the theorem.) Since limk→∞ pk  = 0, then lim

∇f (x∗ ) = lim ∇f (xk ) = 0. k→∞

(ii) { xk } converges to x∗ superlinearly: From the assumptions on f and its derivatives, there exists an α > 0 such that ∇f (xk+1 ) = ∇f (xk+1 ) − ∇f (x∗ ) ≥ α xk+1 − x∗  for all sufficiently large values of k (see the Exercises). Hence ∇f (xk+1 ) α xk+1 − x∗  ≥ pk  pk  α xk+1 − x∗  ≥ xk+1 − x∗  + xk − x∗  α xk+1 − x∗  / xk − x∗  . = xk+1 − x∗  / xk − x∗  + 1 But since lim

k→∞

it follows that

∇f (xk+1 ) = 0, pk 

xk+1 − x∗  = 0, k→∞ xk − x∗  lim

and hence { xk } converges superlinearly. This completes the first half of the proof. The second half, the “only if” part, more or less reverses the arguments used in the first half of the proof. We assume that { xk } converges superlinearly and that ∇f (x∗ ) = 0. Now there exists a constant β > 0 such that ∇f (xk+1 ) = ∇f (xk+1 ) − ∇f (x∗ ) ≤ β xk+1 − x∗  for all sufficiently large k (see the Exercises). The superlinear convergence of { xk } implies that xk+1 − x∗  k→∞ xk − x∗  1 ∇f (xk+1 ) ≥ lim k→∞ β xk − x∗  1 ∇f (xk+1 ) xk+1 − xk  = lim . k→∞ β pk  xk − x∗ 

0 = lim

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 369 i

369

Since lim

xk+1 − xk  =1 xk − x∗ 

lim

∇f (xk+1 ) = 0. pk 

k→∞

(see the Exercises), we obtain that

k→∞

Now, by an argument similar to that used in step (i) of the first half of the proof,     2 ∇f (xk+1 ) − ∇f (xk ) − ∇ 2 f (xk )(xk+1 − xk ) ∇ f (xk )[pk − (pN )k ] ≤ pk  pk  ∇f (xk+1 ) . + pk  Since the limit of the right-hand side is zero, we obtain that   2 ∇ f (xk )[pk − (pN )k ] = 0. lim k→∞ pk  Since ∇ 2 f (x∗ ) is positive definite, ∇ 2 f (xk ) will be positive definite for large values of k, and hence pk − (pN )k  lim = 0. k→∞ pk  This completes the proof.

Exercises 3.1. Let f (x1 , x2 ) = 2x12 + x22 − 2x1 x2 + 2x13 + x14 . What is the Newton direction at the point x0 = (0, 1)T? Use a Cholesky decomposition of the Hessian to solve the Newton equations. 3.2. Use Newton’s method to solve minimize f (x) = 5x 5 + 2x 3 − 4x 2 − 3x + 2. Look for a solution in the interval −2 ≤ x ≤ 2. Make sure that you have found a minimum and not a maximum. You may want to experiment with different initial guesses of the solution. 3.3. Use Newton’s method to solve minimize f (x1 , x2 ) = 5x14 + 6x24 − 6x12 + 2x1 x2 + 5x22 + 15x1 − 7x2 + 13. Use the initial guess (1, 1)T. Make sure that you have found a minimum and not a maximum.

i

i i

i

i

i

i

370

book 2008/10/23 page 370 i

Chapter 11. Basics of Unconstrained Optimization

3.4. Consider the problem minimize f (x) = x 4 − 1. Solve this problem using Newton’s method. Start from x0 = 4 and perform three iterations. Prove that the iterates converge to the solution. What is the rate of convergence? Can you explain this? 3.5. For a one-variable problem, suppose that |x − x∗ | =  where x∗ is a local minimizer. Using a Taylor series expansion, find bounds on |f (x)−f (x∗ )| and |f (x)−f (x∗ )|. 3.6. Consider the problem minimize f (x) = 12 x TQx − cTx, where Q is a positive-definite matrix. Prove that Newton’s method will determine the minimizer of f in one iteration, regardless of the starting point. 3.7. The purpose of this exercise is to prove Theorem 11.2. Assume that the assumptions of the theorem are satisfied. (i) Prove that + , xk+1 − x∗ = ∇ 2 f (xk )−1 ∇ 2 f (xk )(xk − x∗ ) − (∇f (xk ) − ∇f (x∗ )) . (ii) Prove that   xk+1 − x∗  ≤ (L/2) ∇ 2 f (xk )−1  xk − x∗ 2 . Hint: Use Theorem B.6 in Appendix B. (iii) Prove that for all large enough k,   xk+1 − x∗  ≤ L ∇ 2 f (x∗ )−1  xk − x∗ 2 , and from here prove the results of the theorem. 3.8. Let { xk } be a sequence that converges superlinearly to x∗ . Prove that xk+1 − xk  = 1. k→∞ xk − x∗  lim

3.9. Let f be a real-valued function of n variables and assume that f , ∇f , and ∇ 2 f are continuous. Suppose that ∇ 2 f (x) ¯ is nonsingular for some point x. ¯ Prove that there exist constants  > 0 and β > α > 0 such that α x − x ¯ ≤ ∇f (x) − ∇f (x) ¯ ≤ β x − x ¯ for all x satisfying x − x ¯ ≤ . 3.10. Use the previous two problems to complete the proof of Theorem 11.3. 3.11. Assume that the conditions of Theorem 11.3 are satisfied, and that ∇ 2 f (xk ) is positive definite for all k. Also assume that pk is computed as the solution of Bk pk = −∇f (xk ),

i

i i

i

i

i

i

11.4. Guaranteeing Descent

book 2008/10/23 page 371 i

371

where Bk is a positive-definite matrix, and where Bk  ≤ M for all k, with M being some constant. Let (pN )k be the Newton direction at the kth iteration. Prove that   [Bk − ∇ 2 f (xk )]pk  lim =0 k→∞ pk  if and only if

pk − (pN )k  = 0. k→∞ pk  3.12. Consider the minimization problem in Exercise 3.1. Suppose that a change of variables xˆ ≡ Ax + b is performed with     −1 3 1 . and b = A= −2 4 1 lim

Show that the Newton direction for the original problem is the same as the Newton direction for the transformed problem (when both are written using the same coordinate system). 3.13. Prove that the Newton direction remains unchanged if a change of variables xˆ ≡ Ax + b is performed, where A is an invertible matrix.

11.4

Guaranteeing Descent

Our general optimization algorithm (see Section 2.4) determines the new estimate of the solution in the form x + αp, where α > 0 and f (x + αp) < f (x). This is possible if the search direction p is a descent direction, that is, if pT∇f (x) < 0. In this section we show how to use a “modified matrix factorization” to guarantee this for Newton’s method. (Additional requirements on p and α are needed to guarantee convergence of the overall algorithm; see Section 11.5.) In the classical Newton method the search direction is defined by p = −[∇ 2 f (x)]−1 ∇f (x). If p is to be a descent direction at the point x, it must satisfy p T∇f (x) = −∇f (x)T[∇ 2 f (x)]−1 ∇f (x) < 0 or

∇f (x)T[∇ 2 f (x)]−1 ∇f (x) > 0.

This condition will be satisfied if [∇ 2 f (x)]−1 (or equivalently ∇ 2 f (x)) is positive definite. Requiring that ∇ 2 f (x) be positive definite is a stronger condition than pT∇f (x) < 0. To motivate this, recall that Newton’s method can be interpreted as approximating f (x + p) by a quadratic: f (x + p) ≈ f (x) + pT∇f (x) + 12 p T∇ 2 f (x)p.

i

i i

i

i

i

i

372

book 2008/10/23 page 372 i

Chapter 11. Basics of Unconstrained Optimization

The formula for Newton’s method is obtained by setting the derivative of the quadratic function equal to zero. An alternative view is to minimize the quadratic as a function of p. If ∇ 2 f (x) is positive definite, then the minimum is obtained by setting the derivative equal to zero, as before, and the two points of view are equivalent. If ∇ 2 f (x) is indefinite, however, then the quadratic function does not have a finite minimum. If the Hessian matrix is indefinite, then one possible strategy is to replace the Hessian by some related positive-definite matrix in the formula for the Newton direction. This guarantees that the search direction is a descent direction. It also implies that the search direction corresponds to the minimization of a quadratic approximation to the objective function f , a quadratic approximation obtained from the Taylor series by replacing ∇ 2 f (x) with the “related positive-definite matrix.” This might seem arbitrary, but there are several justifications for it. First, if it is done appropriately, then the resulting algorithm can be shown to converge when used inside a line search method. Second, at the solution to the optimization problem ∇ 2 , f (x∗ ) will usually be positive definite (it is always positive semidefinite), so that the Hessian will normally only be replaced at points distant from the solution. Third, the related positive-definite matrix can be found as a side effect of trying to use the classical Newton formula, with little additional computation required. This third point is discussed further below. Computing the search direction involves solving the linear system ∇ 2 f (x)p = −∇f (x). If ∇ 2 f (x) is positive definite, then the factorization ∇ 2 f (x) = LDLT can be used, where the diagonal matrix D has positive diagonal entries (see Appendix A.7.2). If ∇ 2 f (x) is not positive definite, then at some point during the computation of the factorization some diagonal entry of D will satisfy dii ≤ 0. If this happens, then dii should be replaced by some positive entry, perhaps |dii | or some small positive number. It can be shown (via the formulas for the matrix factorization) that modifying the entries of D is equivalent to replacing ∇ 2 f (x) by ∇ 2 f (x) → ∇ 2 f (x) + E, where E is a diagonal matrix, and then factoring this matrix, ∇ 2 f (x) + E = LDLT, and so the modified Hessian matrix is positive definite. This factorization is then used to compute the search direction: (LDLT )p = −∇f (x), and hence the overall technique corresponds to replacing ∇ 2 f (x) by the related positivedefinite matrix ∇ 2 f (x) + E. Even if ∇ 2 f (x) were always positive definite, this matrix

i

i i

i

i

i

i

11.4. Guaranteeing Descent

book 2008/10/23 page 373 i

373

would still be factored to compute the search direction from the Newton formula, and so this “modified” matrix factorization is obtained with little effort—just the effort of changing any negative (or zero) dii to a suitable positive number. Example 11.4 (Modified Matrix Factorization). Suppose that   −1 2 4 ∇ 2 f (x) = 2 −3 6 . 4 6 22 This matrix is symmetric but not positive definite. At the first stage of the factorization, d1,1 = −1; we will replace this number by 4. (In this example the entries in E have been chosen to simplify the calculations.) Then d1,1 = 4, e1,1 = 5, 1,1 = 3,1 = 1, and 2,1 = 12 . At the next stage, d2,2 = −4; we will replace this number by 8. Hence d2,2 = 8, e2,2 = 12, 2,2 = 1, and 3,2 = 12 . At the final stage, d3,3 = 16, so no modification is necessary. The overall factorization is     −1 2 4 5 0 0 2 ∇ f (x) + E = 2 −3 6 + 0 12 0 4 6 22 0 0 0 ⎞ ⎛ ⎞ ⎛  1 12 1 1 0 0 4 0 0 = ⎝ 12 1 0 ⎠ 0 8 0 ⎝ 0 1 12 ⎠ = LDLT. 0 0 16 0 0 1 1 12 1 This final factorization would be used to compute a search direction. There is a great deal of flexibility in choosing how to modify D in the case where ∇ 2 f (x) is not positive definite. Of course, D must be chosen so that the resulting modified matrix is positive definite. To satisfy the assumptions of the convergence theorem for a line search method (see Section 11.5) the modified matrix must not be “arbitrarily” close to being singular; that is, the smallest eigenvalue of the modified matrix must be larger than some positive tolerance. In addition, the norm of the modified matrix must remain bounded. (See the Exercises in Section 11.5.) These conditions place limits on how small and large the elements of D can be. Within this range, however, any choice of D would be acceptable, at least theoretically. We conclude by presenting a practical version of Newton’s method, one that is guaranteed to converge and that does not assume that ∇ 2 f (xk ) is positive definite for all values of k. Some steps in the method are left vague. It is assumed that these steps are carried out in a way that is consistent with Theorem 11.7 of Section 11.5, or some other convergence theorem for a line search method. The convergence test in this algorithm is simplified; a more complete discussion of convergence tests can be found in Section 12.5. Algorithm 11.1. Modified Newton Algorithm with Line Search 1. Specify some initial guess of the solution x0 , and specify a convergence tolerance . 2. For k = 0, 1, . . . (i) If ∇f (xk ) < , stop.

i

i i

i

i

i

i

374

book 2008/10/23 page 374 i

Chapter 11. Basics of Unconstrained Optimization (ii) Compute a modified factorization of the Hessian: ∇ 2 f (xk ) + E = LDLT and solve (LDLT)p = −∇f (xk ) for the search direction pk . (E will be zero if ∇ 2 f (xk ) is “sufficiently” positive definite.) (iii) Perform a line search to determine xk+1 = xk + αk pk , the new estimate of the solution.

Exercises 4.1. Find a diagonal matrix E so that A + E = LDLT, where   1 4 3 A= 4 2 5 . 3 5 3 4.2. Suppose that ∇f (x) = 0 and that ∇ 2 f (x) is indefinite. Show how the modified matrix factorization ∇ 2 f (x) + E = LDLT can be used to compute a direction along which f decreases. 4.3. Apply the result of the previous problem to the matrix   1 4 3 A= 4 2 5 . 3 5 3 4.4. Let M be a positive-definite matrix and let p = −M −1 ∇f (xk ). Prove that p is a descent direction for f at xk . 4.5. Consider the matrix    1 , A= 1 1 where  is some small positive number. Consider two ways of modifying A to make it positive definite, the first where only A2,2 is changed, and the second where both A1,1 and A2,2 are changed. Show that in the first case the norm of the modification is O( −1 ), whereas in the second case the modification can be chosen so that its norm is O(1). 4.6. A vector d is a direction of negative curvature for the function f at the point x if d T∇ 2 f (x)d < 0. Prove that such a direction exists if and only if at least one of

i

i i

i

i

i

i

11.5. Guaranteeing Convergence: Line Search Methods

book 2008/10/23 page 375 i

375

the eigenvalues of ∇ 2 f (x) is negative. Also prove that, if a direction of negative curvature exists, then there also exists a direction of negative curvature that is also a descent direction.

11.5

Guaranteeing Convergence: Line Search Methods

The auxiliary techniques that are used to guarantee convergence attempt to rein in the optimization method when it is in danger of getting out of control, and they also try to avoid intervening when the optimization method is performing effectively. Far from the solution, when the Taylor series is a poor approximation to the function near the optimum, these “globalization strategies” are an active part of the algorithm, preventing movement away from the solution, or even divergence. Near the solution these strategies will remain in the background as safeguards; they are available if required, but normally they will not be invoked. The term “globalization strategy” is used to distinguish the method used for selecting the new estimate of the solution from the method for computing the search direction. In most algorithms, the formula for the search direction is derived from the Taylor series, and the Taylor series is a “local” approximation to the function. The method for choosing the new estimate of the solution is designed to guarantee “global convergence,” that is, convergence from any starting point. Note that this is convergence to a stationary point. If the underlying optimization method produces good search directions, as is often the case with Newton’s method on well-conditioned problems, then the globalization strategies will act merely as a safety net protecting against the occasional bad step. For a method that produces less effective search directions, such as a nonlinear conjugate-gradient method (see Section 13.4), they can be a major contributor to the practical success of a method. We discuss two major types of globalization strategy. Line search methods are the topic of this section, and trust-region methods are the topic of Section 11.6. In later chapters we often assume that one of these strategies has been incorporated into the algorithms we discuss. Typically we refer to using a line search, although in many cases a trust-region strategy could also be used. Line search methods are the oldest and most widely used of the globalization strategies. To describe them, let xk be the current estimate of a minimizer of f , and let pk be the search direction at the point xk . Then the new estimate of the solution is defined by the formula xk+1 = xk + αk pk , where the step length αk is some scalar chosen so that f (xk+1 ) < f (xk ). Since the function value at the new point is smaller than the function value at the current point, progress has been made toward the minimum. (This is not the whole truth. Exceptions and details are discussed below.) Example 11.5 (Line Search). Consider the problem minimize f (x1 , x2 ) = 5x12 + 7x22 − 3x1 x2 .

i

i i

i

i

i

i

376

book 2008/10/23 page 376 i

Chapter 11. Basics of Unconstrained Optimization

Let xk = (2, 3)T and pk = (−5, −7)T, so that f (xk ) = 65. If αk = 1, then f (xk + αk pk ) = f (−3, −4) = 121 > f (xk ), so this is not an acceptable step length. If αk = 12 , then f (xk + αk pk ) = f (− 12 , − 12 ) = 94 , and so this step length produces a decrease in the function value, as desired. Let us look more closely at the line search formula. We will assume that pk is a descent direction at xk ; that is, pk must satisfy pkT∇f (xk ) < 0. This should be guaranteed by the algorithm used to compute the search direction. For Newton’s method this is discussed in Section 11.4. If pk is a descent direction, then f (xk + αpk ) < f (xk ) at least for small positive values of α. Because of this property we assume that the step length satisfies αk > 0. The technique is called a “line search” or “linear search” because a search for a new point xk+1 is carried out along the line y(α) = xk + αpk . Intuitively we would like to choose αk as the solution to minimize F (α) ≡ f (xk + αpk ). α>0

That is, αk would be the result of a one-dimensional minimization problem. It is usually too expensive to solve this one-dimensional problem exactly, so in practice an approximate minimizer is accepted instead. In its crudest form, this approximate minimizer merely reduces the value of the function f , as was indicated above. However, a little more than this is required to guarantee convergence, as the example below indicates. Example 11.6 (A Naive Line Search). Consider the minimization problem minimize f (x) = x 2 with initial guess x0 = −3. At each iteration we use the search direction pk = 1 with step length αk = 2−k . Hence xk+1 = xk + 2−k . The sequence of approximate solutions will be −3, −2, − 23 , − 54 , − 98 , . . . with xk = −(1 + 21−k ). Each search direction is a descent direction since pkT∇f (xk ) = 1 × 2xk = −2(1 + 21−k ) < 0. It is easy to check that f (xk+1 ) < f (xk ) as well. Even though this simple algorithm produces a reduction in the function value at each iteration, it does not converge to a stationary point: lim xk = −1

k→∞

and f (−1) = −2 = 0. The solution is x∗ = 0. Clearly more is required of a line search than just reduction in the value of f .

i

i i

i

i

i

i

11.5. Guaranteeing Convergence: Line Search Methods

book 2008/10/23 page 377 i

377

One way to guarantee convergence is to make additional assumptions, two on the search direction pk and two on the step length αk . The assumptions on the search direction pk are that (a) it produces “sufficient descent,” and (b) it is “gradient related.” The assumptions on the step length αk are that (a) it produces a “sufficient decrease” in the function f , and (b) it is not “too small.” Let us first discuss “sufficient descent.” The search direction must first of all be a descent direction, that is, pkT∇f (xk ) < 0. A danger is that pk might become arbitrarily close to being orthogonal to ∇f (xk ) while still remaining a descent direction, and thus the algorithm would make little progress toward a solution. To ensure against this we assume that pkT∇f (xk ) − ≥>0 pk  · ∇f (xk ) for all k, where  > 0 is some specified tolerance. This condition can also be written as cos θ ≥  > 0, where θ is the angle between the search direction pk and the negative gradient −∇f (xk ). For this reason, it can be referred to as the angle condition. If pk and ∇f (xk ) are orthogonal, then cos θ = 0. The search directions are said to be gradient related if pk  ≥ m ∇f (xk ) for all k, where m > 0 is some constant. This condition states that the norm of the search direction cannot become too much smaller than that of the gradient. These conditions can normally be guaranteed by making slight modifications to the method used to compute the search direction. We will assume that the method used to compute the search direction has been adjusted, if necessary, to guarantee that the sufficient descent and gradient-relatedness conditions are satisfied. Techniques for doing this are discussed in the context of specific methods. The sufficient decrease condition on αk ensures that some nontrivial reduction in the function value is obtained at each iteration. “Nontrivial” is measured in terms of the Taylor series. A linear approximation to f (xk + αpk ) is obtained from f (xk + αpk ) ≈ f (xk ) + αpkT∇f (xk ). In the line search we will demand that the step length αk produce a decrease in the function value that is at least some fraction of the decrease predicted by the above linear approximation. More specifically, we will require that f (xk + αk pk ) ≤ f (xk ) + μαk pkT∇f (xk ), where μ is some scalar satisfying 0 < μ < 1. When μ is near zero this condition is easier to satisfy since only a small decrease in the function value is required. The condition is illustrated in Figure 11.3. It is sometimes referred to as an Armijo condition. If α is small, the linear approximation will be good, and the sufficient decrease condition will be satisfied. If α is large, the decrease predicted by the linear approximation may

i

i i

i

i

i

i

378

book 2008/10/23 page 378 i

Chapter 11. Basics of Unconstrained Optimization

f (xk + α p)

f (xk )

f (xk ) + μ α p T

α=0

f (xk + α p) < f (xk ) + μ α p T

f (xk )

f (xk )

α

Figure 11.3. The sufficient decrease condition. differ greatly from the actual decrease in f , and the condition can be violated. In this sense, the sufficient decrease condition prevents α from being “too large.” We discuss two ways of satisfying the other condition on αk —that it not be “too small.” The first, a simple line search algorithm, will be used to prove a convergence result but is not recommended for practical computations. The second, called a Wolfe condition, leads to better, but more complicated, algorithms; it is discussed in Section 11.5.1. The Wolfe condition is found in many widely used software packages. The simple line search algorithm we will analyze uses backtracking: Let pk be a search direction satisfying the sufficient descent condition. Define αk to be the first element of the sequence 1, 12 , 14 , 18 , . . . , 2−i , . . . that satisfies the sufficient decrease condition. Such an αk always exists. Because a “large” step α = 1 is tried first and then reduced, the step lengths { αk } that are generated by this algorithm will not be “too small.” This algorithm is easy to program on a computer. First, test if α = 1 satisfies the sufficient decrease condition. If it does not, try α = 12 , α = 14 , etc., until an acceptable α is found. The step α = 1 is tried first (rather than α = 5, say) because in the classical Newton method a step of one is always used, and near the solution we would expect that a step of one would be acceptable and lead to a quadratic convergence rate. The theorem below makes several assumptions in addition to those mentioned above. It assumes that the level set { x : f (x) ≤ f (x0 ) } is bounded. This ensures that the function takes on its minimum value at a finite point. It rules out functions such as f (x) = ex that are bounded below (in this case by zero) but only approach this bound in the limit. There is also a technical assumption that the search directions are bounded. This can usually be guaranteed by careful programming of the optimization algorithm. In summary, the theorem requires that the function have a bounded level set, and that the gradient of the function be Lipschitz continuous. All the remaining assumptions are

i

i i

i

i

i

i

11.5. Guaranteeing Convergence: Line Search Methods

book 2008/10/23 page 379 i

379

assumptions about the method and can be satisfied by careful design of the method. The assumptions on the optimization problem are minimal. The conclusion to the theorem does not state that the sequence { xk } converges to a local minimizer of f . It only states that ∇f (xk ) → 0. To prove the stronger result using a line search algorithm, stronger assumptions must be made. Theorem 11.7. Let f be a real-valued function of n variables. Let x0 be a given initial point and define { xk } by xk+1 = xk + αk pk , where pk is a vector of dimension n and αk ≥ 0 is a scalar. Assume that (i) the set S = { x : f (x) ≤ f (x0 ) } is bounded; (ii) ∇f is Lipschitz continuous for all x, that is, ∇f (x) − ∇f (y) ≤ L x − y for some constant 0 < L < ∞; (iii) the vectors pk satisfy a sufficient descent condition pkT∇f (xk ) ≥  > 0; pk  · ∇f (xk )



(iv) the search directions are gradient related: pk  ≥ m ∇f (xk )

for all k (with m > 0),

and bounded in norm: pk  ≤ M for all k;

(v) the scalar αk is chosen as the first element of the sequence 1, 12 , 14 , . . . to satisfy a sufficient decrease condition f (xk + αpk ) ≤ f (xk ) + μαk pkT∇f (xk ), where 0 < μ < 1. Then lim ∇f (xk ) = 0.

k→∞

Proof. There are five steps in the proof. First we show that f is bounded from below on S. Second we show that lim f (xk ) exists. Third we show that lim αk ∇f (xk )2 = 0.

k→∞

Fourth we show that if αk < 1, then αk ≥ γ ∇f (xk )2

i

i i

i

i

i

i

380

book 2008/10/23 page 380 i

Chapter 11. Basics of Unconstrained Optimization

for an appropriate constant γ > 0. Finally, we show that lim ∇f (xk ) = 0. 1. f is bounded from below on S: Because f is continuous, the set S = { x : f (x) ≤ f (x0 ) } is closed. Furthermore, by assumption (i) in the theorem, it is bounded. A continuous function on a closed and bounded set takes on its minimum value at some point in that set (see Appendix B.8). This shows that f is bounded from below on the set S, that is, f (x) ≥ C for some number C. 2. lim f (xk ) exists: The sufficient decrease condition ensures that f (xk+1 ) < f (xk ) ≤ f (x0 ) so that xk ∈ S for all k. The sequence { f (xk ) } is monotone decreasing and bounded from below (by C), so it has a limit f¯. 3. limk→∞ αk ∇f (xk )2 = 0: This follows from f (x0 ) − f¯ = [f (x0 ) − f (x1 )] + [f (x1 ) − f (x2 )] + [f (x2 ) − f (x3 )] + · · · ∞

= [f (xk ) − f (xk+1 )] k=0 ∞

≥−

μαk pkT∇f (xk )

k=0





(from the sufficient decrease condition) μαk  pk  · ∇f (xk )

k=0





(from the sufficient descent condition) μαk m ∇f (xk )2

k=0

(from the gradient-relatedness condition). Since f (x0 ) − f¯ ≤ f (x0 ) − C < ∞ this final summation converges, and so the terms in the summation go to zero: lim μαk m ∇f (xk )2 = 0.

k→∞

The result now follows because m, μ, and  are fixed nonzero constants. 4. If αk < 1, then αk ≥ γ ∇f (xk )2 for an appropriate constant γ > 0: This step of the proof is based on the backtracking line search. If αk < 1, then the sufficient decrease condition was violated when the step length 2αk was tried: f (xk + 2αk pk ) − f (xk ) > 2μαk pkT∇f (xk ). Because ∇f is Lipschitz continuous, by Theorem B.6 of Appendix B we can conclude that f (xk + 2αk pk ) − f (xk ) − 2αk pkT∇f (xk ) ≤ 12 L 2αk pk 2 .

i

i i

i

i

i

i

11.5. Guaranteeing Convergence: Line Search Methods

book 2008/10/23 page 381 i

381

This can be rearranged as f (xk ) − f (xk + 2αk pk ) ≥ −2αk pkT∇f (xk ) − 2L αk pk 2 . Adding this to the first inequality above and simplifying gives αk L pk 2 ≥ −(1 − μ)pkT∇f (xk ). The sufficient descent and gradient-relatedness conditions then give αk L pk 2 ≥ (1 − μ) pk  · ∇f (xk ) ≥ (1 − μ)m ∇f (xk )2 . Since pk  ≤ M, we have that αk ≥ γ ∇f (xk )2 with γ =

(1 − μ)m >0 M 2L

as desired. 5. limk→∞ ∇f (xk ) = 0: Either αk = 1 or αk ≥ γ ∇f (xk )2 . Hence

αk ≥ min 1, γ ∇f (xk )2 and

+

, αk ∇f (xk )2 ≥ min 1, γ ∇f (xk )2 ∇f (xk )2 ≥ 0.

From step 3 we already know that lim αk ∇f (xk )2 = 0. Since γ > 0, this implies that lim ∇f (xk ) = 0 also. The proof is completed.

11.5.1

Other Line Searches

The backtracking line search is not the only way of guaranteeing that the step length αk is not “too small.” This is also guaranteed by conditions derived from the one-dimensional problem minimize F (α) ≡ f (xk + αpk ). α>0

A decrease in the function value corresponds to the condition f (xk + αp) < f (xk ). This is equivalent to the condition F (α) < F (0). Instead of just asking for a decrease in the function value, we could ask that αk approximately minimize F , or that F (αk ) ≈ 0. This condition is normally written as |F (αk )| ≤ η|F (0)|, where η is a constant satisfying 0 ≤ η < 1.

i

i i

i

i

i

i

382

book 2008/10/23 page 382 i

Chapter 11. Basics of Unconstrained Optimization

An exact line search corresponds to choosing an αk ≥ 0 that is a local minimizer of F (α). In this case the above condition is satisfied with η = 0. If f is a quadratic function, there is a simple formula to do this (see the Exercises). On general problems an exact line search is usually too expensive to be a practical technique. Exact line searches are frequently encountered in theoretical results because it can be easier to prove the convergence of an algorithm that uses an exact line search. The term F (α) is a directional derivative of the function f at the point xk + αpk . Its formula can be derived from F (α + h) − F (α) h→0 h f (xk + αpk + hpk ) − f (xk + αpk ) = lim h→0 h f (xk + αpk ) + hpkT∇f (xk + αpk ) + 12 h2 pkT∇ 2 f (ξ )pk = lim h→0 h f (xk + αpk ) (using a Taylor series expansion) − h 1 = lim pkT∇f (xk + αpk ) + hpkT∇ 2 f (ξ )pk h→0 2 = pkT∇f (xk + αpk ).

F (α) = lim

In a similar manner it can be shown that F (α) = pkT∇ 2 f (xk + αpk )pk ; see the Exercises. The value α = 0 corresponds to the point xk . For this value, F (0) = f (xk ), the current function value, and F (0) = pkT∇f (xk ), the directional derivative at the point xk . Example 11.8 (One-Dimensional Problem). Consider the function of two variables f (x) = 12 x12 + x22 − log(x1 + x2 ). Let xk = (1, 1)T and p = (2, −1)T. Then F (α) = f (xk + αp) = 12 (1 + 2α)2 + (1 − α)2 − log(2 + α). Note that F (0) =

3 2

− log 2 = f (xk ). Also, F (α) = 2(1 + 2α) − 2(1 − α) −

1 . 2+α

We can verify that F (α) = pT∇f (xk + αp). First, notice that   x1 − 1/(x1 + x2 ) . ∇f (x) = 2x2 − 1/(x1 + x2 )

i

i i

i

i

i

i

11.5. Guaranteeing Convergence: Line Search Methods

book 2008/10/23 page 383 i

383

f (xk + α p)

f (xk )

Δ

| pT

f (xk + α p) | < η | p T

Δ

α=0

f (xk ) |

α

Figure 11.4. The Wolfe condition. Then  p ∇f (xk + αp) = ( 2 T

−1 )

(1 + 2α) − 1/(2 + α)



2(1 − α) − 1/(2 + α) 2 1 = 2(1 + 2α) − − 2(1 − α) + 2+α 2+α 1 = 2(1 + 2α) − 2(1 − α) − = F (α). 2+α

Using the formula for the directional derivative, the condition |F (αk )| ≤ η|F (0)| becomes |pkT∇f (xk + αk pk )| ≤ η|pkT∇f (xk )|. This is sometimes called the Wolfe condition. It is illustrated in Figure 11.4. The Wolfe condition only finds an approximate stationary point of the function F . A local maximum of this function would satisfy the condition, so by itself it does not guarantee a decrease in the function value. For this reason, algorithms insist that the step length α also satisfy a sufficient decrease condition, with μ < η; often the constant μ is chosen to be very small so that almost any decrease in the function is enough to be acceptable. An elegant convergence result can be derived using the combination of the Wolfe and sufficient decrease conditions; it is outlined in Exercise 5.15. Many widely used line search algorithms are based on the Wolfe condition. These algorithms are often much more effective than the backtracking line search described earlier. However, implementing an inexact line search based on approximately minimizing F is a complicated task, requiring great attention to detail to ensure that an acceptable step length αk that satisfies both the Wolfe and the sufficient decrease conditions can always be found. In a line search based on the Wolfe condition, some form of one-dimensional minimization technique is used to determine a step length. A common approach is to bracket a

i

i i

i

i

i

i

384

book 2008/10/23 page 384 i

Chapter 11. Basics of Unconstrained Optimization

minimizer of F , that is, to find an interval [α, α] that contains a local minimizer of F (α). Then this interval is refined via a sequence of polynomial approximations to F (α). Let us first look at bracketing. We search for an interval [α, α] with F (α) < 0 and F (α) > 0. At some point in the interval there must be an α satisfying F (α) = 0. Since F (0) = pkT∇f (xk ) < 0, the value α = 0 provides an initial lower bound on the step length αk . To obtain an upper bound, an increasing sequence of values of α are examined until one is found that satisfies F (α) > 0. For example, we might try α = 1, then α = 2, α = 4, etc. Then the interval [α, α] brackets a minimizer of F (α), where α is the largest trial value of α for which F (α) < 0. If during the bracketing step a trial value of α that satisfies the Wolfe condition is found, the line search is terminated with that trial value as the step length αk . On the other hand, if no upper bound α is found, then the one-dimensional function F as well as the objective function f may both be unbounded below or may have no finite minimizer. We now assume that an interval [α, α] has been determined that brackets a minimizer of F , with F (α) < 0 and F (α) > 0. A polynomial approximation to the function F will be used to reduce the size of this interval. If cubic approximations are used, then the unique cubic polynomial P3 (α) satisfying P3 (α) = F (α) P3 (α) = F (α) P3 (α) = F (α) P3 (α) = F (α) is computed. (In general, a cubic interpolant is uniquely determined by four independent data values.) This cubic polynomial must have a local minimizer αˆ within the interval [α, α]. The point αˆ is the next estimate of the step length. If this point satisfies the Wolfe condition, then αk = αˆ is accepted as the step length. Otherwise, one of α or α is replaced by αˆ (depending on the sign of F (α)), ˆ and the process repeats. Example 11.9 (Line Search with Wolfe Condition). Suppose that the one-dimensional function is F (α) = 5 − α − log(4.5 − α). At the initial value α = 0, F (0) = 3.4959

and

F (0) = −0.7778 < 0.

We use a Wolfe condition with η = 0.1, so that the step length αk must satisfy |F (αk )| ≤ 0.07778. We first attempt to bracket the step length by trying a sequence of increasing values of α until one is found that satisfies F (α) > 0: α = 1 : F (1) = 2.7472 and F (1) = −0.7143 α = 2 : F (2) = 2.0837 and F (2) = −0.6000 α = 4 : F (4) = 1.6931 and F (4) = 1.0000. Thus α = 4, and the interval that brackets the step length is [α, α] = [2, 4]. None of these trial α values satisfies the Wolfe condition.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 385 i

385

We now refine the interval using cubic polynomial approximations. Using the formulas derived in the Exercises, we determine that the cubic P3 (α) = 0.9309 + 2.5434α − 1.3788α 2 + 0.1976α 3 matches the values of F and F at α and α. It has a local minimizer at αˆ = 3.3826, where F (α) ˆ = 1.5064

and

ˆ = −0.1050. F (α)

This point does not satisfy the Wolfe condition. ˆ < 0 the new interval is [3.3826, 4]. The new cubic is Since F (α) P3 (α) = −25.4041 + 24.7208α − 7.5297α 2 + 0.7608α 3 , with local minimizer αˆ = 3.5294. At this point, F (α) ˆ = 1.5004

and

ˆ = 0.0303, F (α)

so this point satisfies the Wolfe condition, and the step length is αk = 3.5294. (This value of α also satisfies the sufficient decrease condition for μ = 0.1, say.) The exact minimizer of F (α) is α∗ = 3.5. This would be the step length if an exact line search were stipulated. Further care is required to transform this description of a line search algorithm into a piece of software. For example, we have made reference only to the Wolfe condition and have ignored the requirement that the step length simultaneously satisfy the sufficient decrease condition. We have also ignored the effects of computer arithmetic. These topics are discussed in the references cited in the Notes.

Exercises 5.1. Consider the problem minimize f (x1 , x2 ) = (x1 − 2x2 )2 + x14 . (i) Suppose a Newton’s method with a line search is used to minimize the function, starting from the point x = (2, 1)T. What is the Newton search direction at this point? Use a Cholesky decomposition of the Hessian matrix to solve the Newton equations. (ii) Suppose a backtracking line search is used. Does the trial step α = 1 satisfy the sufficient decrease condition for μ = 0.2? For what values of μ does α = 1 satisfy the sufficient decrease condition? 5.2. Let f (x1 , x2 ) = 2x12 + x22 − 2x1 x2 + 2x13 + x14 . (i) Suppose that the function is minimized starting from x0 = (0, −2)T. Verify that p0 = (0, 1)T is a direction of descent.

i

i i

i

i

i

i

386

book 2008/10/23 page 386 i

Chapter 11. Basics of Unconstrained Optimization (ii) Suppose that a line search is used to minimize the function F (α) = f (x0 +αp0 ), and that a backtracking line search is used to find the optimal step length α. Does α = 1 satisfy the sufficient decrease condition for μ = 0.5? For what values of μ does α = 1 satisfy the sufficient decrease condition?

5.3. Consider the quadratic function f (x) = 12 x TQx − cTx, where Q is a positive-definite matrix. Let p be a direction of descent for f at the point x. Prove that the solution of the exact line search problem minimize f (x + αp) α>0

is

pT∇f (x) . p TQp 5.4. Let f be the quadratic function in the previous problem, and assume that f is being minimized with an optimization algorithm that uses an exact line search. Prove that the current search direction pk is orthogonal to the gradient at the new point xk+1 . 5.5. Let f be a differentiable function that is being minimized with an optimization algorithm that uses an exact line search. Prove that the current search direction pk is orthogonal to the gradient at the new point xk+1 . 5.6. Why does the sufficient descent condition use the scaled formula α=−



pkT∇f (xk ) ≥>0 pk  · ∇f (xk )

and not the simpler formula −pT∇f (xk ) ≥  > 0 as a test for descent? 5.7. Prove that F (α) = pT∇ 2 f (xk + αp)p by using the definition F (α) = lim [F (α + h) − F (α)]/ h h→0



together with the formula for F (α) given earlier. 5.8. Consider the objective function from the PET image reconstruction problem described in Section 1.7.5:

  yj log C Tx j . fML = −q T x + j

Let p be the search direction at a feasible point xk , and let w = C Tp. Show how you can use w to calculate the directional derivatives for a sequence of trial values of α, and show that this computation can also be used as part of the forward projection computation at the new point xk+1 . Thus one can test the Wolfe condition without the full expense of calculating the derivatives at the trial points.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 387 i

387

5.9. Suppose that in a line search procedure the trial step αˆ does not satisfy the sufficient decrease condition. One strategy for selecting a new trial step is to approximate F (α) = f (xk + αpk ) by the one-dimensional quadratic function q(α) that satisfies ˆ = F (α). ˆ Determine the coefficients of q(α). q(0) = F (0), q (0) = F (0), and q(α) Let α be the minimizer of q(α). Prove that α=−

αˆ 2 F (0) . 2[F (α) ˆ − F (0) − αF ˆ (0)]

Then α can be used as the new trial step in the line search procedure, if α is not too small. Prove also that αˆ , α< 2(1 − μ) where μ is the constant from the sufficient decrease condition. 5.10. Prove that Theorem 11.7 is still true if the backtracking algorithm in the line search chooses αk as the first element of the sequence 1, 1/κ, 1/κ 2 , . . . , 1/κ i , . . . to satisfy the sufficient decrease condition, where κ > 1. 5.11. Show how to determine the cubic polynomial P3 satisfying P3 (α) = F (α)

P3 (α) = F (α)

P3 (α) = F (α)

P3 (α) = F (α),

where α < α, F (α) < 0, and F (α) > 0. Why is this polynomial unique? What is the formula for the unique local minimizer of P3 in the interval [α, α]? You may wish to write the polynomial in the form P3 (α) = c1 + c2 (α − α) + c3 (α − α)2 + c4 (α − α)2 (α − α). Verify that the polynomials obtained in Example 11.9 are correct. 5.12. A line search using the Wolfe condition can also be designed using quadratic polynomials. In this case a quadratic polynomial P2 is computed that satisfies P2 (α) = F (α),

P2 (α) = F (α),

and

P2 (α) = F (α).

Determine the coefficients of P2 , assuming that α < α, F (α) < 0, and F (α) > 0. Also determine the formula for the unique local minimizer of P2 in the interval [α, α]. You may wish to write the polynomial in the form P2 (α) = c1 + c2 (α − α) + c3 (α − α)2 . Apply your line search to the function in Example 11.9. 5.13. Suppose that the modified Newton direction p is computed using ∇ 2 f (x) + E = LDLT,

i

i i

i

i

i

i

388

book 2008/10/23 page 388 i

Chapter 11. Basics of Unconstrained Optimization   where E ≤ C ∇ 2 f (x) for some constant C, and where the smallest eigenvalue of ∇ 2 f (x) + E is greater than or equal to γ > 0. For appropriate constants  and m > 0, prove that the direction p is a sufficient descent direction: −

pT∇f (x) ≥>0 p · ∇f (x)

and is gradient related: pk  ≥ m ∇f (xk ) . 5.14. (The goal of this problem is to prove that if Newton’s method converges when an exact line search is used, then it converges quadratically.) Suppose that Newton’s method is used to solve minimize f (x) and that an exact line search is used at every iteration. Assume that the classical Newton method (that is, Newton’s method with no line search) converges quadratically to x∗ , and that ∇ 2 f (x) is Lipschitz continuous on n . (i) Let αk be the step length from the exact line search. Prove that αk = 1 + O(∇f (xk )) for all sufficiently large k. Hint: Let F (α) = f (xk + αpk ) and expand the condition F (α) = 0 in a Taylor series. (ii) Prove that xk+1 − x∗  = O(∇f (xk )2 ) + O(xk − x∗ 2 ). (iii) Prove that xk+1 − x∗  = O(xk − x∗ 2 ). 5.15. (The goal of this problem is to prove a convergence theorem for a line search algorithm based on the Wolfe condition.) We will assume that an algorithm is available to compute a step length αk satisfying f (xk + αk pk ) ≤ f (xk ) + μαk pkT∇f (xk ) pkT∇f (xk + αk pk ) ≥ ηpkT∇f (xk ), with 0 < μ < η < 1. This is a less stringent form of the Wolfe condition presented earlier and is known as the weak Wolfe condition. We will also assume that the search directions satisfy a sufficient descent condition −

pkT∇f (xk ) ≥  > 0. pk  · ∇f (xk )

Let f be a real-valued function of n variables, and let x0 be some given initial point. Assume that (i) the set S = { x : f (x) ≤ f (x0 ) } is bounded, and (ii) ∇f is Lipschitz continuous in S, that is, there exists a constant L > 0 such that ∇f (x) − ∇f (x) ¯ ≤ L x − x ¯ for all x, x¯ ∈ S.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 389 i

389

(i) Prove that (η − 1)pkT∇f (xk ) ≤ pkT(∇f (xk+1 ) − ∇f (xk )) ≤ αk L pk 2 . (ii) Prove that f (xk+1 ) ≤ f (xk ) − c cos2 θk ∇f (xk )2 , where c = μ(1 − η)/L and θk is the angle between pk and −∇f (xk ). (iii) Prove that ∞

cos2 θk ∇f (xk )2 < ∞. k=0

(iv) Prove that lim ∇f (xk ) = 0.

k→∞

5.16. In this problem we examine conditions that guarantee the existence of a step size that satisfies both the sufficient decrease and the weak Wolfe conditions. Let f be a differentiable function, and let p be a descent direction for f at the point xk . Let F (α) = f (xk + αp), and assume that F is bounded below for all positive α. Let 0 < μ < 1 denote the parameter in the sufficient decrease condition, and let 0 < η < 1 denote the parameter of the weak Wolfe condition. (i) Prove that F (α) < F (0) + μαF (0) for all sufficiently small α > 0, and that F (α) > F (0) + μαF (0) for all sufficiently large α. Use this to prove that there exists some α such that F (α) = F (0) + μαF (0). Let α¯ be the smallest step size that satisfies this equation. Prove that the sufficient descent condition is satisfied for any 0 < α < α. ¯ (ii) Prove that there exists a scalar 0 < αˆ < α¯ for which ˆ = ∇f (xk + αp ˆ k )Tp = μF (0). F (α) (iii) Suppose that μ < η. Prove that the weak Wolfe condition and the sufficient decrease condition are satisfied for any positive α in a neighborhood of α. ˆ 5.17. This problem shows that, in an algorithm where the search directions approach the Newton direction, the step length αk = 1 satisfies the weak Wolfe condition and the sufficient decrease condition for all large k. We assume here that 0 ≤ μ ≤ 12 , and that μ ≤ η ≤ 1, where μ and η are the parameters of the sufficient decrease condition and the Wolfe condition, respectively. We also assume that the function f has two continuous derivatives, and that the iterates are generated using xk+1 = xk + αpk , where pkT∇f (xk ) < 0. Suppose that xk converges to a point x∗ at which ∇ 2 f (x∗ ) is positive definite. Suppose also that  2  ∇ f (xk )pk + ∇f (xk ) lim = 0. k→∞ pk 

i

i i

i

i

i

i

390

book 2008/10/23 page 390 i

Chapter 11. Basics of Unconstrained Optimization (i) Prove that there exists a γ > 0 such that −pkT∇f (xk ) ≥ γ pk 2 . Hint: Use the fact that −pkT∇f (xk ) = pkT∇ 2 f (xk )pk − pkT[∇ 2 f (xk )pk + ∇f (xk )]. (ii) Prove that there exists a point ξk on the line segment between xk and xk + pk such that f (xk + pk ) − f (xk ) − 12 pkT∇f (xk ) = 21 pkT[∇ 2 f (ξk )pk + ∇f (xk )]. Use this to prove that f (xk + pk ) − f (xk ) − 12 pkT∇f (xk ) ≤ ( 12 − μ)η pk 2 for all large k, and hence a step length of 1 satisfies the sufficient decrease condition for all large k. (iii) Prove that there exists a ζk on the line segment between xk and xk + pk such that pkT∇f (xk + pk ) = pkT[∇ 2 f (ζk )pk + ∇f (xk )], and conclude from this that pkT∇f (xk + pk ) ≤ γ η pk 2 ≤ −ηpkT∇f (xk ) for all large k, and hence a step length of 1 satisfies the weak Wolfe conditions for all large k.

5.18. Write a computer program for minimizing a multivariate function using a modified Newton algorithm. If, in the Cholesky factorization of the Hessian, the diagonal

entry di,i ≤ 0, replace it by max |di,i |, 10−2 . Include the following: (i) Use a backtracking line search as described in this section. (ii) Accept x as a solution if ∇f (x) /(1 + |f (x)|) ≤ , or if the number of iterations exceeds Itmax. Use  = 10−8 and Itmax = 1000. (iii) Print out the initial point, and then at each iteration print the search direction, the step length α, and the new estimate of the solution xk+1 . (If a great many iterations are required, provide this output only for the first 10 iterations and the final 5 iterations.) Indicate if no solution has been found after Itmax iterations. (iv) Test your algorithm on the test problems listed here: x0 = (1, 1, 1)T f(1) (x) = x12 + x22 + x32 , f(2) (x) = x12 + 2x22 − 2x1 x2 − 2x2 , x0 = (0, 0)T f(3) (x) = 100(x2 − x12 )2 + (1 − x1 )2 , x0 = (−1.2, 1)T f(4) (x) = (x1 + x2 )4 + x22 ,

x0 = (2, −2)T

f(5) (x) = (x1 − 1) + (x2 − 1) + c(x12 + x22 − 0.25)2 , 2

2

x0 = (1, −1)T.

i

i i

i

i

i

i

11.6. Guaranteeing Convergence: Trust-Region Methods

book 2008/10/23 page 391 i

391

For the final function, test three different settings of the parameter c: c = 1, c = 10, and c = 100. The condition number of the Hessian matrix at the solution becomes larger as c increases. Comment on how this affects the performance of the algorithm. (v) Are your results consistent with the theory of Newton’s method?

11.6

Guaranteeing Convergence: Trust-Region Methods

Trust-region methods offer an alternative framework for guaranteeing convergence. They were first used to solve nonlinear least-squares problems, but have since been adapted to more general optimization problems. Trust-region methods make explicit reference to a “model” of the objective function. For Newton’s method this model is a quadratic model derived from the Taylor series for f about the point xk : qk (p) = f (xk ) + ∇f (xk )Tp + 12 p T∇ 2 f (xk )p. The method will only “trust” this model within a limited neighborhood of the point xk , defined by the constraint p ≤ k . This will serve to limit the size of the step taken from xk to xk+1 . The value of k is adjusted based on the agreement between the model qk (p) and the objective function f (xk + p). If the agreement is good, then the model can be trusted and k increased. If not, then k will be decreased. (In the discussion here we assume that · = ·2 , that is, we use the Euclidean norm. Other trust-region algorithms sometimes use different norms for reasons associated with the computation of the step pk .) At the early iterations of the method when xk may be far from the solution x∗ , the values of k may be small and may prevent a full Newton step from being taken. However, at later iterations when xk is closer to x∗ , it is hoped that there will be greater trust in the model. Then k can be made sufficiently large so that it does not impede Newton’s method, and a quadratic convergence rate is achievable. At iteration k of a trust-region method, the following subproblem is solved to determine the step: minimize qk (p) = f (xk ) + ∇f (xk )Tp + 12 p T∇ 2 f (xk )p p

subject to

p ≤ k .

This is a constrained optimization problem. The optimality conditions for this subproblem (see Section 14.5.1) show that pk will be the solution of the linear system (∇ 2 f (xk ) + λI )pk = −∇f (xk ), where λ ≥ 0 is a scalar (called the Lagrange multiplier for the constraint), (∇ 2 f (xk ) + λI ) is positive semidefinite, and λ( k − pk ) = 0. We will not derive this result here.

i

i i

i

i

i

i

392

book 2008/10/23 page 392 i

Chapter 11. Basics of Unconstrained Optimization

f (xk )

xk

-

Δ

Δ

2

-1

f (xk )

Δ

Δ

-

f (xk )

Figure 11.5. Piecewise linear approximation to trust-region curve. If ∇ 2 f (xk ) is positive definite and k is sufficiently large, then the solution of the subproblem is the solution to ∇ 2 f (xk )p = −∇f (xk ), the Newton equations. Without these assumptions, the method guarantees that   k ≥ pk  = (∇ 2 f (xk ) + λI )−1 ∇f (xk ) , and so if k → 0, then λ → ∞ and 1 pk ≈ − ∇f (xk ). λ (For a more rigorous demonstration of this, see the Exercises.) Hence pk is a function of λ and indirectly a function of k . As λ varies between 0 and ∞, it can be shown that pk = pk (λ) varies continuously between the Newton direction (in the positive-definite case) and a multiple of −∇f (xk ). This is illustrated in Figure 11.5. In the figure, the arc shows the values of pk (λ). As λ → ∞, pk (λ) points in the direction of the negative gradient. For λ = 0, pk (0) is the Newton direction. This approach is in sharp contrast to a line search method, where the search direction is chosen (perhaps using the Newton equations) but then left fixed while the step length is computed. In a trust-region method the choice of the bound k affects both the length and the direction of the step pk (but the step length is always one or zero). We now specify the steps in a simple trust-region algorithm based on Newton’s method. Algorithm 11.2. Trust-Region Algorithm 1. Specify some initial guess of the solution x0 . Select the initial trust-region bound 0 > 0. Specify the constants 0 < μ < η < 1 (perhaps μ = 14 and η = 34 ). 2. For k = 0, 1, . . . (i) If xk is optimal, stop.

i

i i

i

i

i

i

11.6. Guaranteeing Convergence: Trust-Region Methods

book 2008/10/23 page 393 i

393

(ii) Solve minimize

qk (p) = f (xk ) + ∇f (xk )Tp + 12 p T∇ 2 f (xk )p

subject to

p ≤ k

p

for the trial step pk . (iii) Compute ρk =

f (xk ) − f (xk + pk ) actual reduction . = f (xk ) − qk (pk ) predicted reduction

(iv) If ρk ≤ μ, then xk+1 = xk (unsuccessful step), else xk+1 = xk + pk (successful step). (v) Update k : ρk ≤ μ ⇒ k+1 = 12 k μ < ρk < η ⇒ k+1 = k ρk ≥ η ⇒ k+1 = 2 k . The value of ρk indicates how well the model predicts the reduction in the function value. If ρk is small (that is, ρk ≤ μ), then the actual reduction in the function value is much smaller than that predicted by qk (pk ), indicating that the model cannot be trusted for a bound as large as k ; in this case the step pk will be rejected and k will be reduced. If ρk is large (that is, ρk ≥ η), then the model is adequately predicting the reduction in the function value, suggesting that the model can be trusted over an even wider region; in this case the bound k will be increased. Example 11.10 (Trust-Region Method). Consider the unconstrained minimization problem minimize f (x1 , x2 ) = (x14 + 2x13 + 24x12 ) + (x24 + 12x22 ) with initial guess x0 = (2, 1)T and initial trust-region bound 0 = 1. At the initial point,     152 120 0 , and ∇ 2 f (x0 ) = . f (x0 ) = 141, ∇f (x0 ) = 28 0 36 The Newton direction is −1

pN = −∇ f (x0 ) ∇f (x0 ) = 2



− 152 120 − 28 36



 ≈

−1.2667 −0.7778

 .

Since pN  = 1.4864 > 0 = 1, the Newton step cannot be used. The trust-region step can be obtained by finding a scalar λ such that p = 1, where p is the solution to      p1 120 + λ 0 152 . =− 0 36 + λ 28 p2 A simple calculation shows that λ must satisfy  2  2 152 28 + = 1. 120 + λ 36 + λ

i

i i

i

i

i

i

394

book 2008/10/23 page 394 i

Chapter 11. Basics of Unconstrained Optimization

This equation can be solved numerically to obtain λ ≈ 42.655. (Software for a trust-region method would typically find only an approximate solution to this nonlinear equation.) Hence the trust-region step is   −0.9345 . p0 = −0.3560 It is easy to verify that p0  = 1. For this step the trust-region model has the value q0 (p0 ) = f (x0 ) + ∇f (x0 )Tp0 + 12 p0T∇ 2 f (x0 )p0 = 43.6680. The function value at x0 +p0 is f (x0 +p0 ) = 39.8420. Hence the ratio of actual to predicted reduction is f (x0 ) − f (x0 + p0 ) 141 − 39.8420 ρ0 = = = 1.0393. f (x0 ) − q0 (p0 ) 141 − 43.6680 If we use the constants μ = 14 and η = 34 in the trust-region algorithm, then ρ0 > η, the step is successful, x1 = x0 + p0 = (1.0655, 0.6440)T, and 1 = 2 0 = 2. The solution of the trust-region subproblem minimize

qk (p) = f (xk ) + ∇f (xk )Tp + 12 p T∇ 2 f (xk )p

subject to

p ≤ k

p

is difficult. For example, if the Newton direction does not satisfy the constraint, then it is necessary to determine λ so that   pk  = (∇ 2 f (xk ) + λI )−1 ∇f (xk ) = k . This is a nonlinear equation in λ. In addition, it is necessary to choose λ so that (∇ 2 f (xk ) + λI ) is positive definite, adding a further complication. Practical trust-region methods find only an approximate solution to the trust-region subproblem. One approach is to find an approximate solution to this nonlinear equation. Newton’s method could be applied, but more efficient special methods have been derived. Even these special methods are computationally expensive, however. For each new estimate of λ, a linear system involving the matrix (∇ 2 f (xk ) + λI ) must be solved. A second approach to solving the subproblem is to approximate pk (λ), the curve of steps defined as λ varies between 0 and ∞, by a simpler curve. It is common to use a piecewise linear curve, that is, a sequence of line segments. For λ ≈ 0 the line segment should coincide with the Newton step (in the positive-definite case), and as λ → ∞ it should coincide with −∇f (xk ). It is easy to determine which point on this sequence of line segments solves the subproblem. The sequence of line segments is sometimes called a “dogleg” by analogy with the game of golf. For further information on both these approaches, see the book by Dennis and Schnabel (1983, reprinted 1996). Both line search and trust-region methods have been used as the basis for optimization software. Experiments have shown them to be comparably efficient on average, although on individual problems their performance can differ. There are sometimes subtle reasons for preferring one approach over the other. Some of these reasons are discussed in the paper by Dennis and Schnabel (1989).

i

i i

i

i

i

i

11.6. Guaranteeing Convergence: Trust-Region Methods

book 2008/10/23 page 395 i

395

We now state a convergence theorem that is analogous to the convergence theorem for line search methods. The conclusion is the same, and the assumptions on the problem are similar. Additional theoretical results, including a discussion of second-order optimality conditions, can be found in the paper by Moré (1983). See the Notes. Theorem 11.11. Let f be a real-valued function of n variables. Let x0 be some given initial point, and let { xk } be defined by the trust-region algorithm above. Assume that (i) the set S = { x : f (x) ≤ f (x0 ) } is bounded, and (ii) f , ∇f , and ∇ 2 f are continuous for all x ∈ S. Then lim ∇f (xk ) = 0.

k→∞

Proof. The proof will be in two parts. In the first part, we will prove that a subsequence of { ∇f (xk ) } converges to zero. The proof is by contradiction. If no such subsequence converges to zero, then for all sufficiently large values of k, ∇f (xk ) ≥  > 0 where  is some constant. Since we are interested only in the asymptotic behavior of the algorithm, we can ignore the early iterations, so we may as well assume that ∇f (xk ) ≥  for all k. This simplifies the argument. The first part of the proof has five major steps. The first two steps establish relationships among the quantities f (xk )−f (xk+1 ), qk (pk ), k , and ∇f (xk ). These relationships are valid in general. The remaining steps use the assumption that ∇f (xk ) ≥  to obtain a contradiction. Step 3 shows that lim k = 0. If k is small, then so is pk , and the quadratic model must be a good prediction of the actual reduction in the function value (that is, lim ρk = 1). If this is true, then the algorithm will not reduce k (that is, lim k = 0), thus contradicting the result of step 3 and proving the overall result. Throughout the proof wedenote ∇fk = ∇f (xk ) and ∇ 2 fk = ∇ 2 f (xk ). In addition, let M be a constant satisfying ∇ 2 fk  ≤ M for all k. The upper bound M exists because ∇ 2 f is continuous and the set S is closed and bounded. 1. A bound on the predicted reduction: We prove that f (xk ) − qk (pk ) ≥

1 2

 ∇fk  ∇fk  · min k , M

by examining how small qk could be if pk were a multiple of −∇fk . To do this we define the function   ∇fk − f (xk ) φ(α) ≡ qk −α ∇fk  ∇f T(∇ 2 fk )∇fk ∇f T∇fk = −α k + 12 α 2 k ∇fk  ∇fk 2 1 = −α ∇fk  + α 2 Mk , 2   2 where Mk = ∇fkT(∇ 2 fk )∇fk / ∇fk  ≤ ∇ 2 fk  ≤ M. Let α∗ be the minimizer of φ on the interval [0, k ]. Note that α∗ > 0. If 0 < α∗ < k , then α∗ can be

i

i i

i

i

i

i

396

book 2008/10/23 page 396 i

Chapter 11. Basics of Unconstrained Optimization determined by setting φ (α) = 0, showing that α∗ = ∇fk  /Mk and φ(α∗ ) = − 12 ∇fk 2 /Mk ≤ − 12 ∇fk 2 /M. On the other hand, suppose that α∗ = k . It follows that Mk k ≤ ∇fk  (if Mk ≤ 0, then this is trivially satisfied; otherwise, this is a consequence of setting φ (α) = 0, since the solution of this equation must be ≥ k ). Thus φ(α∗ ) = φ( k ) = − k ∇fk  + 12 2k Mk ≤ − 12 k ∇fk  .

Finally, the desired result is obtained by noting that qk (pk ) − f (xk ) ≤ φ(α∗ ). 2. A bound on f (xk ) − f (xk+1 ): If a successful step is taken, then μ ≤ ρk =

f (xk ) − f (xk+1 ) , f (xk ) − qk (pk )

where μ is the constant used to test ρk in the algorithm. Hence f (xk ) − f (xk+1 ) ≥ (f (xk ) − qk (pk ))μ ≥

 ∇fk  1 μ ∇fk  · min k , 2 M

using the result of step 1. 3. lim k = 0: First, note that lim f (xk ) exists and is finite (f is bounded below on S, and the algorithm ensures that f cannot increase at any iteration). If, as in our contrary assumption, ∇fk  ≥  > 0, and if k is a successful step, then step 2 shows that 1  . f (xk ) − f (xk+1 ) ≥ μ · min k , . 2 M The limit of the left-hand side is zero, so lim ki = 0, where { ki } are the indices of the iterations where successful steps are taken. At successful steps the trust-region bound is either kept constant or doubled, and at unsuccessful steps the bound is reduced. So between successful steps, 2 ki ≥ ki +1 ≥ ki +2 ≥ · · · ≥ ki+1 . Thus lim k = 0 also. 4. lim ρk = 1: Using the remainder form of the Taylor series for f (xk + pk ), we obtain |f (xk + pk ) − qk (pk )| = |f (xk ) + ∇fkTpk + 12 pkT∇ 2 f (xk + ξk pk )pk − qk (pk )| = | − 12 pkT(∇ 2 fk )pk + 12 pkT∇ 2 f (xk + ξk pk )pk | ≤ 12 M pk 2 + 12 M pk 2 = M pk 2 ≤ M 2k . Using the bound from step 1 and the result of step 3, we obtain f (xk ) − qk (pk ) ≥ 12  k

i

i i

i

i

i

i

11.6. Guaranteeing Convergence: Trust-Region Methods

book 2008/10/23 page 397 i

397

for large values of k. Hence     f (xk ) − f (xk + pk )  − 1 |ρk − 1| =  f (xk ) − qk (pk ) |f (xk + pk ) − qk (pk )| = |f (xk ) − qk (pk )| M 2 2M ≤ 1 k = k → 0.   k 2 This is the desired result. 5. lim k = 0: If lim ρk = 1, then for large values of k the algorithm will not decrease k . Hence k will be bounded away from zero. This is the desired contradiction establishing that a subsequence of the sequence { ∇f (xk ) } converges to zero. This completes the first part of the proof. The second part of the proof shows that  lim ∇fk  = 0. This also is proved by contradiction. If this result is not true, then ∇fki  ≥  > 0 for some subset { ki } of the iterations of the algorithm. (This may be a different  than used above.) However, since a subsequence of { ∇f (xk ) } converges to zero, there must exist a set of indices { i } such that ∇fk  ≥ 14  for ki ≤ k < i   ∇f  < 1 . i 4 If ki ≤ k < i and iteration k is successful, then step 2 above shows that     1  1 1 4  · min k , . f (xk ) − f (xk+1 ) ≥ μ 2 4 M The left-hand side of this inequality goes to zero, so that f (xk ) − f (xk+1 ) ≥ 1 xk+1 − xk  , where 1 = 18 μ. Because xk+1 − xk  = 0 for an unsuccessful step, this result is valid for ki ≤ k < i . Using this result repeatedly, we obtain   1 xki − xi        ≤ 1 (xki − xki +1  + xki +1 − xki +2  + · · · + xi −1 − xi ) ≤ f (xki ) − f (xki +1 ) + f (xki +1 − f (xki +2 ) + · · · + f (xi −1 ) − f (xi ) = f (xki ) − f (xi ). Since the right-hand side of this result goes to zero, the left-hand side can be made arbitrarily small. Because ∇f (x) is continuous on the set S, and S is closed and bounded, by choosing i large enough it is possible to guarantee that   ∇fk − ∇f  ≤ 1 . i i 4

i

i i

i

i

i

i

398

book 2008/10/23 page 398 i

Chapter 11. Basics of Unconstrained Optimization

We are now ready to obtain the desired contradiction:      ≤ ∇fki  = (∇fki − ∇fi ) + ∇fi      ≤ ∇fki − ∇fi  + ∇fi  ≤ 14  + 14  = 12  < . Hence lim ∇f (xk ) = 0.

Exercises 6.1. Perform an additional iteration of the trust-region method in Example 11.10. 6.2. Suppose that, in a trust-region method, pk = αv where v is some nonzero vector. Show how to determine α so that pk solves the trust-region subproblem minimize

qk (p) = f (xk ) + ∇f (xk )Tp + 12 p T∇ 2 f (xk )p

subject to

p ≤ k .

p

6.3. Extend the result of the previous problem to the case where pk is constrained to lie on a piecewise linear path. That is, ⎧ if pk  ≤ δ1 ; αv ⎪ ⎨ 1 if δ1 ≤ pk  ≤ δ2 ; α1 v1 + αv2 pk = ⎪ ⎩ α1 v1 + α2 v2 + αv3 if δ2 ≤ pk  ≤ δ3 ; etc. 6.4. Theorem 11.11 assumes that ∇ 2 f is continuous for all x ∈ S. Prove that the theorem is still true even if ∇ 2 f is only bounded for all x ∈ S. 6.5. Define p(λ) by (∇ 2 f (x) + λI )p(λ) = −g(x). (i) If ∇ 2 f (x) is nonsingular, prove that lim p(λ) = −∇ 2 f (x)−1 ∇f (x).

λ→0

(ii) Prove that lim λp(λ) = −∇f (x),

λ→+∞

and hence prove p(λ) ≈ −(1/λ)∇f (x) for sufficiently large λ. (iii) Use (ii) to prove that lim p(λ) = 0. λ→+∞

(iv) If (∇ f (x) + λI ) is nonsingular, prove that 2

d p(λ)T(∇ 2 f (x) + λI )−1 p(λ) p(λ) = − . p(λ) dλ Use this result to prove that, if (∇ 2 f (x) + λI ) is positive definite, then p(λ) is a monotone decreasing function of λ.

i

i i

i

i

i

i

11.7. Notes

book 2008/10/23 page 399 i

399

(v) Let d be a nonzero vector satisfying d T∇f (x) = 0. Prove that d Tp(λ) = 0. λ→+∞ p(λ) lim

6.6. We show in Chapter 14 that the solution to the trust-region subproblem satisfies (∇ 2 f (xk ) + λI )pk = −∇f (xk ) λ( k − pk ) = 0 (∇ 2 f (xk ) + λI ) is positive semidefinite for some λ ≥ 0. Use these conditions to answer the following questions. (i) If λ = 0, prove that pk solves minimize subject to

qk (p) p = k .

Hint: Prove that, for any p, qk (pk ) ≤ qk (p) + 12 λ(p Tp − pkTpk ). (ii) If λ = 0 and ∇ 2 f (xk ) is positive definite, prove that pk solves the trust-region subproblem. (iii) If the trust-region subproblem has no solution such that pk  = k , prove that ∇ 2 f (xk ) is positive definite and   2 ∇ f (xk )−1 ∇f (xk ) < k . 6.7. Assume that ∇ 2 f (x) is positive definite, and let pN be the Newton direction at x. Let pC be the solution to minimize

q(−α∇f (x))

subject to

α∇f (x) ≤ .

α

¯ (x). (i) Find a formula for α¯ satisfying pC = −α∇f (ii) Define p(α) = pC + α(pN − pc) for 0 ≤ α ≤ 1. Prove that p(α) is strictly monotone increasing as a function of α. Hint: Consider the derivative with respect to α of p(α)2 . (iii) Prove that q(p(α)) is strictly monotone decreasing as a function of α. (iv) Prove that there is a unique α∗ satisfying p(α∗ ) = .

11.7

Notes

Superlinear Convergence—Theorem 11.3 is adapted from the paper by Dennis and Moré (1974). Guaranteeing Descent—The derivation given above of the modification E to the Hessian ignores a few details. To ensure the convergence of the descent method in Theorem 11.7

i

i i

i

i

i

i

400

book 2008/10/23 page 400 i

Chapter 11. Basics of Unconstrained Optimization

(see Section 11.5), we make a number of assumptions about the search directions. These assumptions are guaranteed to be satisfied if both ∇ 2 f (x) + E and (∇ 2 f (x) + E)−1 are bounded. However, if the modification E is chosen carelessly, this will not be true. Safe ways of choosing E are discussed in the papers by Gill and Murray (1974a) and Schnabel and Eskow (1990). These papers also show how a search direction can be chosen in the case where ∇f (x) = 0 and ∇ 2 f (x) is indefinite (that is, x is a stationary point but not a local minimizer of f ). The techniques used in this section are not the only way to salvage Newton’s method in the indefinite case. The trust-region approach discussed in Section 11.6 is another, where the Hessian is replaced by a matrix of the form (∇ 2 f (xk ) + λI ) for some λ ≥ 0. Still other ideas are discussed in the book by Gill, Murray, and Wright (1981). Line Search Methods—An extensive discussion of convergence theory for line search methods can be found in the book by Ortega and Rheinboldt (1970, reprinted 2000). Some practical line search algorithms are described in the papers by Gill and Murray (1974b) and Moré and Thuente (1994). The Wolfe condition and other conditions that can be used to design a line search are discussed in the paper by Wolfe (1969). A summary can be found in the paper by Nocedal (1992). Trust-Region Methods—The idea of a trust region was first proposed by Levenberg (1944) and Marquardt (1963) as a technique for solving nonlinear least-squares problems. Methods for computing the search direction within a trust-region method are described in the papers by Gay (1981), Sorensen (1982), and Moré and Sorensen (1983). Convergence theory is discussed in the paper by Moré (1983). An extensive overview of trust-region methods can be found in the book by Conn, Gould, and Toint (1987). The proof of the convergence theorem is originally due to Powell (1975) and Thomas (1975). The assumptions we make are more stringent than necessary. For example, we assume that the trust-region subproblem is solved exactly. This is not necessary. In step 1 of the first part of the proof, we examine how small qk could be if the step pk were a multiple of −∇fk . As long as an iteration of the method reduces the function value by some nontrivial fraction of this amount, then the conclusion is still true. (In fact, it is not difficult to modify the proof to show this.) A great many practical methods, including the “dogleg” approach of Powell (1970), are capable of achieving this. (See also the papers of Steihaug (1983) and Toint (1981) for results applicable to large problems.) The assumptions of the theorem are sufficient to prove a stronger result, namely that there is some limit point x∗ of the sequence { xk } for which ∇ 2 f (x∗ ) is positive semidefinite. (See the papers by Moré and Sorensen mentioned above.) Thus x∗ satisfies the second-order necessary conditions for a local minimizer. This stronger result may not hold, however, if the trust-region subproblem is solved approximately using dogleg and related approaches.

i

i i

i

i

i

i

book 2008/10/23 page 401 i

Chapter 12

Methods for Unconstrained Optimization

12.1

Introduction

A principal advantage of Newton’s method is that it converges rapidly when the current estimate of the variables is close to the solution. It also has disadvantages, and overcoming these disadvantages has led to many ingenious techniques. In particular, Newton’s method can fail to converge, or it can converge to a point that is not a minimum. This is its most serious failing, but one which can be overcome by using strategies that guarantee progress towards the solution at every iteration, such as the line search and trust-region strategies discussed in Chapter 11. The costs of Newton’s method can also be a concern. It requires the derivation, computation, and storage of the second derivative matrix, and the solution of a system of linear equations. Obtaining the second derivative matrix can be tedious and can be prone to error. An alternative is toautomate the calculation of second derivatives, or to use a method that reduces the requirement to compute derivative values. We will consider both of these ideas. The other costs of Newton’s method are the computational costs of applying the method. If there are n variables, and if the problem is not sparse, calculating the Hessian matrix involves calculating and storing about n2 entries, and solving a linear system requires about n3 arithmetic operations. If n is small, these costs might be acceptable. For n of moderate size (say, n < 200) storing this matrix might be acceptable, but solving a linear system might not be. Also for large n (say, n > 1000), even storing this matrix might be undesirable. Luckily, large problems are frequently sparse, and taking advantage of sparsity can greatly reduce the computational costs of Newton’s method and make it a practical tool in such cases. Techniques for exploiting sparsity are mentioned in Chapter 13 and Appendix A. A major topic of this chapter will be methods for solving unconstrained problems that are compromises to Newton’s method and that reduce one or more of these costs. In exchange, these other methods generally have slower rates of convergence. A trade-off is made between the cost per iteration and the number of iterations. We present two compromises on Newton’s method: quasi-Newton methods and the steepest-descent method. Quasi-Newton methods are currently among the most widely used 401

i

i i

i

i

i

i

402

book 2008/10/23 page 402 i

Chapter 12. Methods for Unconstrained Optimization

Newton-type methods for problems of moderate size, where matrices can be stored. The steepest-descent method is an old and widely known method whose costs are low but whose performance is usually atrocious. It illustrates the dangers of compromising too much when using Newton’s method. These methods are based on Newton’s method but use a different formula to compute the search direction. They are based on approximating the Hessian matrix in a way that lowers the costs of the algorithm. These methods also have slower convergence rates than Newton’s method, and so there is a trade-off between the cost per iteration (higher for Newton’s method) and the number of iterations (higher for the other methods). Additional methods are discussed in the next chapter that are suitable for problems with many variables. Many of these methods can be interpreted as computing the search direction by solving a linear system of equations Bk p = −∇f (xk ), where Bk is a positive-definite matrix. In the case of Newton’s method, Bk = ∇ 2 f (xk ), assuming that the Hessian matrix is positive definite. Intuitively, Bk should be some approximation to ∇ 2 f (xk ). This interpretation emphasizes that these methods are compromises on Newton’s method, where the degree of compromise reflects the degree to which Bk approximates the Hessian ∇ 2 f (xk ). In some situations it is desirable to use a method that does not require derivatives. For example, if you wish to optimize a function which does not have derivatives at all points, then Newton’s method and related methods cannot be used. Effective derivative-free methods have been developed that do not require the user to compute derivatives and that do not make use of derivative values to find a solution. What is surprising is that these methods have guarantees of convergence comparable to quasi-Newton methods. It is perhaps also surprising that such methods are suitable for parallel computing. The chapter includes some practical information about the design and use of software for unconstrained optimization, for Newton-like methods, as well as for derivative-free methods. It concludes with a summary of the historical background for these methods.

12.2

Steepest-Descent Method

The steepest-descent method is the simplest Newton-type method for nonlinear optimization. The price for this simplicity is that the method is hopelessly inefficient at solving most problems. The method has theoretical uses, though, in proving the convergence of other methods, and in providing lower bounds on the performance of better algorithms. It is well known, and has been widely used and discussed, and so it is worthwhile to be familiar with it if only to know not to use it on general problems. The steepest-descent method is old, but not as old as Newton’s method. It was invented in the nineteenth century by Cauchy, about two hundred years later than Newton’s method. It is much simpler than Newton’s method. It does not require the computation of second derivatives, it does not require that a system of linear equations be solved to compute the search direction, and it does not require matrix storage. So in every way it reduces the costs of Newton’s method—at least, the costs per iteration. On the negative side it has a slower rate of convergence than Newton’s method; it converges only at a linear rate, with a constant

i

i i

i

i

i

i

12.2. Steepest-Descent Method

book 2008/10/23 page 403 i

403

that is usually close to one. Hence it often converges slowly—sometimes so slowly that xk+1 − xk is below the precision of computer arithmetic and the method fails. As a result, even though the costs per iteration are low, the overall costs of solving an optimization problem are high. The steepest-descent method computes the search direction from pk = −∇f (xk ) and then uses a line search to determine xk+1 = xk + αk pk . Hence the cost of computing the search direction is just the cost of computing the gradient. Since the gradient must be computed to determine if the solution has been found, it is reasonable to say that the search direction is available for free. The search direction is a descent direction if ∇f (xk ) = 0; that is, it is a descent direction unless xk is a stationary point of the function f . The formula for the search direction can be derived in two ways, both of which have connections with Newton’s method. The first derivation is based on a crude approximation to the Hessian. If the formula for Newton’s method is used ((∇ 2 f )p = −∇f ) but with the Hessian approximated by the identity matrix (∇ 2 f ≈ I ), then the formula for the steepestdescent method is obtained. This approach, where an approximation to the Hessian is used in the Newton formula, is the basis of the quasi-Newton methods discussed in Section 12.3. The second, and more traditional, derivation is based on the Taylor series and explains the name “steepest descent.” In our derivation of Newton’s method, the function value f (xk + p) was approximated by the first three terms of the Taylor series, and the search direction was obtained by minimizing this approximation. Here we use only the first two terms of the Taylor series: f (xk + p) ≈ f (xk ) + p T∇f (xk ). The intuitive idea is to minimize this approximation to obtain the search direction; however, this approximation does not have a finite minimum in general. Instead, the search direction is computed by minimizing a scaled version of this approximation: minimize p =0

p T∇f (xk ) . p · ∇f (xk )

The solution is pk = −∇f (xk ) (see the Exercises). To explain the name “steepest descent,” we recall that a descent direction satisfies the condition pT∇f (xk ) < 0. Choosing p to minimize p T∇f (xk ) gives the direction that provides the “most” descent possible. In the line search we also required that the search direction satisfy the sufficient descent condition −

pT∇f (xk ) ≥  > 0. pk  · ∇f (xk )

For steepest descent this condition simplifies to −

−∇f (xk )T∇f (xk ) =1>0 ∇f (xk )T∇f (xk )

i

i i

i

i

i

i

404

book 2008/10/23 page 404 i

Chapter 12. Methods for Unconstrained Optimization

and so is clearly satisfied. The gradient-relatedness condition pk  ≥ m ∇f (xk ) is also satisfied, with m = 1. Example 12.1 (The Steepest-Descent Method). We apply the steepest-descent method to a three-dimensional quadratic problem minimize f (x) = 12 x TQx − cTx with



1 Q= 0 0 The steepest-descent direction is

0 5 0

0 0 25



 and

c=

−1 −1 −1

 .

pk = −∇f (xk ) = −(Qxk − c). An exact line search is used so that xk+1 = xk + αk pk with αk = −

∇f (xk )Tpk pkTQpk

(see Exercise 5.3 of Chapter 11). The solution of the minimization problem is ⎞ ⎛ −1 1 x∗ = Q−1 c = ⎝ − 5 ⎠ . 1 − 25 If the initial guess of the solution is x0 = (0, 0, 0)T, then   1 f (x0 ) = 0, ∇f (x0 ) = 1 , ∇f (x0 ) = 1.7321. 1 This implies that the step length is α0 = 0.0968 leading to the following new estimate of the solution:   −0.0968 x1 = −0.0968 . −0.0968 At this point,   0.9032 f (x1 ) = −0.1452, ∇f (x1 ) = 0.5161 , ∇f (x1 ) = 1.7598. −1.4194 The next step length is α1 = 0.0590 and the new estimate of the solution is   −0.1500 x2 = −0.1272 . −0.0131

i

i i

i

i

i

i

12.2. Steepest-Descent Method

book 2008/10/23 page 405 i

405

At the point x2 ,  f (x2 ) = −0.2365,

∇f (x2 ) =

0.8500 0.3639 0.6732

 ,

∇f (x2 ) = 1.1437.

It takes 216 iterations before the norm of the gradient is less than 10−8 . Now we determine the rate of convergence for the steepest-descent method. In view of Theorem 11.3, superlinear convergence cannot in general be expected. In fact, we show that linear convergence is all that can be guaranteed. Much of our analysis is for the case of a quadratic function: minimize f (x) = 12 x TQx − cTx, where Q is positive definite. Results for the more general nonlinear case are mentioned afterward. The convergence rate is analyzed using f (xk ) − f (x∗ ) instead of xk − x∗  because the analysis is simpler. It can be shown that the two quantities converge at the same rate, using an argument similar to that used in Section 2.7 (see the Exercises). The argument used here is adapted from the book by Luenberger (2003). Since x∗ = Q−1 c (or equivalently, c = Qx∗ ) we obtain f (xk ) − f (x∗ ) = ( 12 xkTQxk − cTxk ) − ( 12 x∗TQx∗ − cTx∗ ) = 12 xkTQxk − (Qx∗ )Txk − ( 12 x∗TQx∗ − (Qx∗ )Tx∗ ) = 12 xkTQxk − x∗TQxk − ( 12 x∗TQx∗ − x∗TQx∗ ) = 12 xkTQxk − x∗TQxk + 12 x∗TQx∗ = 12 (xk − x∗ )TQ(xk − x∗ ). We define E(x) = 12 (x − x∗ )TQ(x − x∗ ). The convergence result is proved using the function E(x) and is based on the following two lemmas. Lemma 12.2. Assume that { xk } is the sequence of approximate solutions obtained when the steepest-descent method is applied to the quadratic function f (x) = 12 x TQx − cTx, and where an exact line search is used. Then   (∇f (xk )T∇f (xk ))2 E(xk+1 ) = 1 − E(xk ). (∇f (xk )TQ∇f (xk ))(∇f (xk )TQ−1 ∇f (xk )) Proof. See the Exercises. Lemma 12.3. Let Q be a positive-definite matrix. For any vector y = 0,   cond(Q) − 1 2 (y Ty)2 , ≥1− (y TQy)(y TQ−1 y) cond(Q) + 1 where cond(Q) is the condition number of Q (see Appendix A.8).

i

i i

i

i

i

i

406

book 2008/10/23 page 406 i

Chapter 12. Methods for Unconstrained Optimization

Proof. See the book by Luenberger (2003). Lemma 12.4. Assume that { xk } is the sequence of approximate solutions obtained when the steepest-descent method is applied to the quadratic function f (x) = 12 x TQx − cTx and where an exact line search is used. Then for any x0 the method converges to the unique minimizer x∗ of f , and furthermore,   cond(Q) − 1 2 (f (xk ) − f (x∗ )), f (xk+1 ) − f (x∗ ) ≤ cond(Q) + 1 that is, the method converges linearly. Proof. This is a direct consequence of the two previous lemmas. Since the rate constant is strictly less than one, the method converges from any starting point. Example 12.5 (Convergence of the Steepest-Descent Method). This convergence theory can be applied to the problem in the previous example. In this case the condition number is cond(Q) = 25 and the corresponding bound on the rate constant is 0.8521. Table 12.1 lists the values of E(xk+1 ) f (xk+1 ) − f (x∗ ) = f (xk ) − f (x∗ ) E(xk ) and compares them to this rate constant. For this example, the observed rate constant is about 0.84, which is close to but less than the bound given in the theorem. This is typical for the steepest-descent method. The theorem provides only an upper bound on the rate constant, but in many examples this bound is close to the observed rate constant (see the Exercises). Table 12.2 compares the

Table 12.1. Observed rate constant. f (xk )

E(xk+1 )/E(xk )

Bound

0 −0.1452 −0.2365 −0.3038 −0.3560 −0.3988 −0.4343 −0.4640 −0.4889 −0.5098 −0.5274

— 0.7659 0.8077 0.8246 0.8348 0.8379 0.8397 0.8401 0.8404 0.8405 0.8405

0.8521 0.8521 0.8521 0.8521 0.8521 0.8521 0.8521 0.8521 0.8521 0.8521 0.8521

i

i i

i

i

i

i

12.2. Steepest-Descent Method

book 2008/10/23 page 407 i

407

Table 12.2. Rate constants for the steepest-descent method. cond(Q) 1 10 100 1000 10000 100000 1000000

Constant 0 0.669421 0.960788 0.996008 0.999600 0.999960 0.999996

x

0

x2

x1

Figure 12.1. Steepest-descent in two dimensions (part 1). bound on the rate constant to various values of the condition number cond(Q). Notice that, even for moderate values of cond(Q), the bound is close to one. Only when the condition number is less than about 50 does this method converge fast enough to be of practical value. For example, if cond(Q) = 100, then the steepest-descent algorithm is guaranteed to improve the solution by only about 4% per iteration. The convergence theorem given here applies only to quadratic functions. For general nonlinear functions it is possible to show that the steepest-descent method (with an exact line search) also converges linearly, with a rate constant that is bounded by 

cond(Q) − 1 cond(Q) + 1

2 ,

where Q = ∇ 2 f (x∗ ), the Hessian at the solution. Hence the method behaves much the same way on general functions as it does on quadratic functions. This poor behavior of the steepest-descent method may be surprising. In Figure 12.1 the method is applied to a two-dimensional quadratic function. The method works well in this case. For this problem, cond(Q) ≈ 1 and the rate constant is near 0, so the good performance is confirmed by the theory. In cases where cond(Q) ≈ 1, the picture looks more like Figure 12.2. In this case the steepest-descent directions are almost at right angles to the direction of the minimizer and the method performs poorly, as we would expect. It is this particular figure that should be remembered.

i

i i

i

i

i

i

408

book 2008/10/23 page 408 i

Chapter 12. Methods for Unconstrained Optimization

x0

x2 x3

x1

Figure 12.2. Steepest-descent in two dimensions (part 2).

Exercises 2.1. Use the steepest-descent method to solve minimize f (x1 , x2 ) = 4x12 + 2x22 + 4x1 x2 − 3x1 , starting from the point (2, 2)T. Perform three iterations. 2.2. Apply the steepest-descent method, with an exact line search, to the three-dimensional quadratic function f (x) = 12 x TQx − cTx with  Q=

1 0 0

0 γ 0

0 0 γ2

 and

  1 c= 1 . 1

Here γ is a parameter that can be varied. Try γ = 1, 10, 100, 1000. How do your results compare with the convergence theory developed above? (If you do this by hand, perform four iterations; if you are using a computer, then it is feasible to perform more iterations.) 2.3. Consider the problem minimize f (x1 , x2 ) = x12 + 2x22 . (i) If the starting point is x0 = (2, 1)T, show that the sequence of points generated by the steepest-descent algorithm is given by    1 k 2 xk = 3 (−1)k if an exact line search is used. (ii) Show that f (xk+1 ) = f (xk )/9. (iii) Compare the results in (ii) to the bounds on the convergence rate of the steepestdescent method when minimizing a quadratic function. What conclusions can you draw regarding this method?

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 409 i

409

2.4. The method of steepest descent applied to the problem minimize f (x1 , x2 ) = 4x12 + x22 generates a sequence of points { xk }. (i) If x0 = (1, 4)T, show that

 xk = (0.6)k

(−1)k 4

 .

(ii) What is the minimizer x∗ of f ? What is f (x∗ )? What is the rate of convergence of the sequence { f (xk ) − f (x∗ ) }? 2.5. Suppose that the steepest-descent method (with an exact line search) is used to minimize the quadratic function f (x) = 12 x TQx − cTx, where Q is a positive-definite matrix. Prove that ∇fk+1 = ∇fk −

∇fkT∇fk Q∇fk , ∇fkTQ∇fk

where ∇fk = ∇f (xk ) and ∇fk+1 = ∇f (xk+1 ). 2.6. In this problem we will derive the subproblem used to determine the steepest-descent direction from the Taylor series. (i) Prove that the subproblem minimize p T∇f (xk ) p

does not have a finite solution unless ∇f (xk ) = 0. (ii) If we normalize the vectors p and ∇f (xk ) by dividing each of them by their norms, we obtain the subproblem minimize p =0

p T∇f (xk ) . p · ∇f (xk )

Solve this problem using the formula p T∇f (xk ) = p · ∇f (xk ) cos θ , where θ is the angle between p and ∇f (xk ). 2.7. Are there starting points for which the steepest-descent algorithm terminates in one iteration? This problem will partly address this question for the case of a strictly convex quadratic function. Consider the problem minimize f (x) = 12 x TQx − cTx, where Q is a positive-definite matrix. Let x∗ be the minimizer of this function. Let v be an eigenvector of Q, and let λ be the associated eigenvalue. Suppose now that the starting point for the steepest-descent algorithm is x0 = x∗ + v.

i

i i

i

i

i

i

410

book 2008/10/23 page 410 i

Chapter 12. Methods for Unconstrained Optimization (i) Prove that the gradient at x0 is ∇f (x0 ) = λv. (ii) Prove that if the steepest-descent direction is taken, then the step length which minimizes f in this direction is α0 = 1/λ. (iii) Prove that the steepest-descent direction with an accurate step length will lead to the minimum of the function f in one iteration. (iv) Confirm this result for the function f (x) = 3x12 − 2x1 x2 + 3x22 + 2x1 − 6x2 . Suppose that the starting point is x0 = (1, 2)T; compute the point obtained by one iteration of the steepest-descent algorithm. Prove that the point obtained is the unique minimum x∗ . Verify that x0 − x∗ is an eigenvector of the Hessian matrix.

2.8. Prove Lemma 12.2. 2.9. Suppose that lim xk = x∗ , where x∗ is a local minimizer of the nonlinear function f (the sequence { xk } need not come from the steepest-descent method). Assume that ∇ 2 f (x∗ ) is positive definite. Prove that the sequence { f (xk ) − f (x∗ ) } converges linearly if and only if { xk − x∗  } converges linearly. Prove that the two sequences converge at the same rate, regardless of what this rate is. What is the relationship between the rate constants for the two sequences? [Hint: See Section 2.7, but note that in that section the problem is to find a solution to f (x) = 0 and not minimize f (x).] 2.10. Write a computer program for minimizing a multivariate function using the steepestdescent algorithm. Include the following details: (i) Use a backtracking line search as described in Section 11.5. (ii) Accept x as a solution if ∇f (x) /(1 + |f (x)|) ≤ , or if the number of iterations exceeds Itmax. Use  = 10−5 and Itmax = 1000. (iii) Print out the initial point, and then at each iteration print the search direction, the step length α, and the new estimate of the solution xk+1 . (If a great many iterations are required, provide this output only for the first 10 iterations and the final 5 iterations.) Indicate if no solution has been found after Itmax iterations. (iv) Test your algorithm on the test problems listed here: x0 = (1, 1, 1)T f(1) (x) = x12 + x22 + x32 , f(2) (x) = x12 + 2x22 − 2x1 x2 − 2x2 , x0 = (0, 0)T f(3) (x) = 100(x2 − x12 )2 + (1 − x1 )2 , x0 = (−1.2, 1)T f(4) (x) = (x1 + x2 )4 + x22 ,

x0 = (2, −2)T

f(5) (x) = (x1 − 1)2 + (x2 − 1)2 + c(x12 + x22 − 0.25)2 ,

x0 = (1, −1)T.

For the final function, test the following three different settings of the parameter c: c = 1, c = 10, and c = 100. The condition number of the Hessian matrix at the solution becomes larger as c increases. Comment on how this affects the performance of the algorithm. (v) Are your computational results consistent with the theory of the steepestdescent method?

i

i i

i

i

i

i

12.3. Quasi-Newton Methods

book 2008/10/23 page 411 i

411

2.11. Consider the minimization problem in Exercise 3.1 of Chapter 11. Suppose that a change of variables xˆ ≡ Ax + b is performed with     −1 3 1 . and b = A= −2 4 1 Show that the steepest-descent direction for the original problem is not the same as the steepest-descent direction for the transformed problem (when both are written using the same coordinate system). 2.12. Prove that the steepest-descent direction is changed if a change of variables xˆ ≡ Ax + b is performed, where A is an invertible matrix, unless A is an orthogonal matrix.

12.3

Quasi-Newton Methods

Quasi-Newton methods are among the most widely used methods for nonlinear optimization. They are incorporated in many software libraries, and they are effective in solving a wide variety of small to mid-size problems, in particular when the Hessian is hard to compute. In cases when the number of variables is large, other methods may be preferred, but even in this case they are the basis for limited-memory quasi-Newton methods, an effective method for solving large problems (see Chapter 13). There are many different quasi-Newton methods, but they are all based on approximating the Hessian ∇ 2 f (xk ) by another matrix Bk that is available at lower cost. Then the search direction is obtained by solving Bk p = −∇f (xk ), that is, from the Newton equations but with the Hessian replaced by Bk . If the matrix Bk is positive definite, then this is equivalent to minimizing the quadratic model minimize q(p) = f (xk ) + ∇f (xk )Tp + 12 p TBk p. The various quasi-Newton methods differ in the choice of Bk . There are several advantages to this approach. First, an approximation Bk can be found using only first-derivative information. Second, the search direction can be computed using only O(n2 ) operations (versus O(n3 ) for Newton’s method in the nonsparse case). There are also disadvantages, but they are minor. The methods do not converge quadratically, but they can converge superlinearly. At the precision of computer arithmetic, there is not much practical difference between these two rates of convergence. Also, quasi-Newton methods still require matrix storage, so they are not normally used to solve large problems. Modifications to quasi-Newton methods that do not use matrix storage are available, though; see Section 13.5. Quasi-Newton methods are generalizations of a method for one-dimensional problems called the secant method. The secant method uses the approximation f (xk ) ≈

f (xk ) − f (xk−1 ) xk − xk−1

i

i i

i

i

i

i

412

book 2008/10/23 page 412 i

Chapter 12. Methods for Unconstrained Optimization

in the formula for Newton’s method xk+1 = xk − f (xk )/f (xk ). This results in the formula xk+1 = xk −

(xk − xk−1 ) f (xk ). f (xk ) − f (xk−1 )

It is illustrated in the example below. Example 12.6 (The Secant Method). We apply the secant method to minimize f (x) = sin x. The secant method requires that two initial points be specified, x0 and x1 . We use x0 = 0 and x1 = −1. Then x2 = x1 −

(x1 − x0 ) f (x1 ) f (x1 ) − f (x0 )

= −1 −

(−1 − 0) cos(−1) cos(−1) − cos(0)

= −1 −

(−1 − 0) 0.5403 = −2.1753. 0.5403 − 1

The next few iterates are x3 = −1.5728, x4 = −1.5707, and x5 = −1.5708 ≈ −π/2, and so the sequence converges to a solution of the problem. Under appropriate assumptions, the secant method can be proved to converge super√ linearly with rate r = 12 (1 + 5) ≈ 1.618 (the “golden ratio”). See, for example, the book by Conte and de Boor (1980). Quasi-Newton methods are based on generalizations of the formula f (xk ) ≈

f (xk ) − f (xk−1 ) . xk − xk−1

This formula cannot be used in the multidimensional case because it would involve division by a vector, an undefined operation. This condition is rewritten in the form ∇ 2 f (xk )(xk − xk−1 ) ≈ ∇f (xk ) − ∇f (xk−1 ). From this we obtain the condition used to define the quasi-Newton approximations Bk : Bk (xk − xk−1 ) = ∇f (xk ) − ∇f (xk−1 ). We will call this the secant condition. For an n-dimensional problem this condition represents a set of n equations that must be satisfied by Bk . However, the matrix Bk has n2 entries, and so this condition by itself is insufficient to define Bk uniquely (unless n = 1). Additional conditions must be imposed to specify a particular quasi-Newton method. The secant condition has extra significance when f is a quadratic function, f (x) = 1 T x Qx − cTx. In this case 2 Q(xk − xk−1 ) = (Qxk − c) − (Qxk−1 − c) = ∇f (xk ) − ∇f (xk−1 )

i

i i

i

i

i

i

12.3. Quasi-Newton Methods

book 2008/10/23 page 413 i

413

so that the Hessian matrix Q satisfies the secant condition. Intuitively we are asking that the approximation Bk mimic the behavior of the Hessian matrix when it multiplies xk − xk−1 . Although this interpretation is precise only for quadratic functions, it holds in an approximate way for general nonlinear functions. We are asking that the approximation Bk imitate the effect of the Hessian matrix along a particular direction. Before going further it is useful to define two vectors that will appear repeatedly in the discussion of quasi-Newton methods: sk = xk+1 − xk

yk = ∇f (xk+1 ) − ∇f (xk ).

and

This notation is used throughout the literature on quasi-Newton methods. The secant condition then becomes Bk sk−1 = yk−1 or, as will be more convenient to us, Bk+1 sk = yk . When a line search is used, xk+1 = xk + αk pk where αk is the step length and pk is the search direction. In this case sk = αk pk . An example of a quasi-Newton approximation is given by the formula Bk+1 = Bk +

(yk − Bk sk )(yk − Bk sk )T . (yk − Bk sk )Tsk

The numerator of the second term is the outer product of two vectors and is an n × n matrix. This approximation is illustrated in the following example. Example 12.7 (A Quasi-Newton Approximation). We will look at a three-dimensional example. Let k = 1, and define       1 0 0 2 5 B0 = I = 0 1 0 , s0 = 3 , y0 = 6 . 0 0 1 4 7 Then (y0 − B0 s0 ) = (3, 3, 3)T. We compute   3 3 (3 3

(y0 − B0 s0 )(y0 − B0 s0 ) =I+ (y0 − B0 s0 )Ts0 (3 ⎛4 1 1⎞   3 3 3 1 9 9 9 ⎟ ⎜ =I+ 9 9 9 = ⎝ 13 43 13 ⎠ . 27 9 9 9 1 1 4 T

B1 = B0 +

3

3

3

3

3)

  2 3) 3 4

3

It is easy to check that ⎛4 ⎜ B1 s0 = ⎝

3 1 3 1 3

1 3 4 3 1 3

1 3 1 3 4 3

⎞ ⎟ ⎠

    2 5 3 = 6 = y0 , 4 7

so the secant condition is satisfied.

i

i i

i

i

i

i

414

book 2008/10/23 page 414 i

Chapter 12. Methods for Unconstrained Optimization

This simple formula for Bk+1 displays many of the general properties of quasi-Newton methods. • The secant condition will be satisfied regardless of how Bk is chosen: Bk+1 sk = Bk sk + = Bk sk +

(yk − Bk sk )(yk − Bk sk )T sk (yk − Bk sk )Tsk (yk − Bk sk )((yk − Bk sk )Tsk ) (yk − Bk sk )Tsk

= Bk sk + (yk − Bk sk ) = yk . • The new approximation Bk+1 , is obtained by modifying the old approximation Bk . To start a quasi-Newton method some initial approximation B0 must be specified. Often B0 = I is used, but it is reasonable and often advantageous to supply a better initial approximation if one can be obtained with little effort. • The new approximation Bk+1 can be obtained from Bk using O(n2 ) arithmetic operations since the difference Bk+1 − Bk only involves products of vectors. More surprisingly the search direction can also be computed using O(n2 ) arithmetic operations. Normally the computational cost of solving a system of linear equations is O(n3 ), so this represents a significant saving. The costs are lower in this case because it is possible to derive formulas that update a Cholesky factorization of Bk rather than Bk itself. With a factorization available, the search direction can be computed via backsubstitution. All the quasi-Newton methods we consider have the form Bk+1 = Bk + [something]. The “something” represents an “update” to the old approximation Bk , and so a formula for a quasi-Newton approximation is often referred to as an update formula. A variety of quasi-Newton methods are obtained by imposing conditions on the approximation Bk . These conditions are usually properties of the Hessian matrix that we would like the approximation to share. For example, since the Hessian matrix is symmetric, perhaps the approximation Bk should be symmetric as well. The quasi-Newton formula in Example 12.7, (yk − Bk sk )(yk − Bk sk )T Bk+1 = Bk + , (yk − Bk sk )Tsk preserves symmetry because Bk+1 is symmetric if Bk is. It is called the symmetric rank-one update formula. The “rank-one” is in its name because the update term is a matrix of rank one. This is the only rank-one update formula that preserves symmetry, as the lemma below shows. Lemma 12.8. Let Bk be a symmetric matrix. Let Bk+1 = Bk + C where C = 0 is a matrix of rank one. Assume that Bk+1 is symmetric, Bk+1 sk = yk , and (yk − Bk sk )Tsk = 0. Then C=

(yk − Bk sk )(yk − Bk sk )T . (yk − Bk sk )Tsk

i

i i

i

i

i

i

12.3. Quasi-Newton Methods

book 2008/10/23 page 415 i

415

Proof. If Bk+1 = Bk + C and both Bk and Bk+1 are symmetric, then C must be symmetric also. Since C is also of rank one, C must have the form C = γ wwT, where γ is a scalar and w is a vector of norm one. (See the Exercises.) Now we use the secant condition yk = Bk+1 sk = (Bk + C)sk = (Bk + γ ww T)sk = Bk sk + γ w(w Tsk ). This can be rewritten as γ (w Tsk )w = yk − Bk sk . If w Tsk = 0, then Bk sk = yk , or in other words, Bk already satisfies the secant condition, so there is no reason to perform any update. Since the theorem assumed that C = 0, we can rule this out, and so w Tsk = 0. Hence we can write w = θ(yk − Bk sk ), where θ = 1/ yk − Bk sk . This shows that w is a multiple of yk −Bk sk . (Since C = γ ww T, the sign of θ is irrelevant.) It only remains to determine the value of γ in terms of Bk , sk , and yk . To do this we use γ (wTsk )w = yk − Bk sk : yk − Bk sk = γ (wTsk )w γ [(yk − Bk sk )Tsk ](yk − Bk sk ), = yk − Bk sk 2 so γ =

yk − Bk sk 2 . (yk − Bk sk )Tsk

If we now substitute the formulas for γ and w into C = γ ww T, the result follows. If a quasi-Newton method is used with a line search, then the algorithm takes the following form. Algorithm 12.1. Quasi-Newton Algorithm 1. Specify some initial guess of the solution x0 and some initial Hessian approximation B0 (perhaps B0 = I ). 2. For k = 0, 1, . . . (i) (ii) (iii) (iv)

If xk is optimal, stop. Solve Bk p = −∇f (xk ) for pk . Use a line search to determine xk+1 = xk + αk pk . Compute sk = xk+1 − xk yk = ∇f (xk+1 ) − ∇f (xk ).

i

i i

i

i

i

i

416

book 2008/10/23 page 416 i

Chapter 12. Methods for Unconstrained Optimization (v) Compute Bk+1 = Bk + · · · using some update formula. This is illustrated below using the symmetric rank-one formula on a quadratic problem.

Example 12.9 (The Symmetric Rank-One Formula). We will look at a three-dimensional quadratic problem f (x) = 12 x TQx − cTx with  Q=

2 0 0

0 3 0

0 0 4



 c=

and

−8 −9 −8

 ,

whose solution is x∗ = (−4, −3, −2)T. An exact line search will be used (see Exercise 5.3 of Section 11.5). The initial guesses are B0 = I and x0 = (0, 0, 0)T. At the initial point, ∇f (x0 ) = −c = 14.4568, so this point is not optimal. The first search direction is  p0 =

−8 −9 −8



and the line search formula gives α0 = 0.3333. The new estimate of the solution, the update vectors, and the new Hessian approximation are  x1 =

−2.6667 −3.0000 −2.6667



 , ∇f1 =

2.6667 0 −2.6667



 , s0 =

and (y0 − I s0 )(y0 − I s0 )T = B1 = I + (y0 − I s0 )Ts0



−2.6667 −3.0000 −2.6667

1.1531 0.3445 0.4593



 , y0 =

0.3445 1.7751 1.0335

−5.3333 −9.0000 −10.6667

0.4593 1.0335 2.3780

 ,

 .

At this new point ∇f (x1 ) = 3.7712 so we keep going, obtaining the search direction  p1 =

−2.9137 −0.5557 1.9257



and the step length α1 = 0.3942. This gives the new estimates  x2 =

−3.8152 −3.2191 −1.9076



 , ∇f2 =

and

 B2 =

0.3697 −0.6572 0.3697

1.6568 0.6102 −0.3432



 , s1 =

−1.1485 −0.2191 0.7591

0.6102 1.9153 0.6102

−0.3432 0.6102 3.6568



 , y1 =

−2.2970 −0.6572 3.0363

 ,

 .

i

i i

i

i

i

i

12.3. Quasi-Newton Methods

book 2008/10/28 page 417 i

417

At the point x2 , ∇f (x2 ) = 0.8397 so we keep going, with   −0.4851 p2 = 0.5749 −0.2426 and α = 0.3810. This gives         −4 0 −0.1848 −0.3697 x3 = −3 , ∇f3 = 0 , s2 = 0.2191 , y2 = 0.6572 , −2 0 −0.0924 −0.3697 and B3 = Q. Now ∇f (x3 ) = 0, so we stop. The final approximation matrix B3 is equal to Q, the Hessian matrix. In exact arithmetic, this will always happen within n iterations when the symmetric rank-one formula is applied to a quadratic problem, but it is not guaranteed on more general problems. Symmetry is not the only property that can be imposed. Since the Hessian matrix at the solution x∗ will normally be positive definite (it will always be positive semidefinite), it is reasonable to ask that the matrices Bk be positive definite as well. This will also guarantee that the quasi-Newton method corresponds to minimizing a quadratic model of the nonlinear function f , and that the search direction is a descent direction. (See the remarks in Section 11.4.) There is no rank-one update formula that maintains both symmetry and positive definiteness of the Hessian approximations. However, there are infinitely many rank-two formulas that do this. The most widely used formula, and the one considered to be most effective, is the BFGS update formula Bk+1 = Bk −

(Bk sk )(Bk sk )T yk ykT + T . skTBk sk yk sk

The BFGS formula gets its name from the four people who developed it: Broyden, Fletcher, Goldfarb, and Shanno. It is easy to check that Bk+1 sk = yk . It is not as easy to check that it has the property that we want. Lemma 12.10. Let Bk be a symmetric positive-definite matrix, and assume that Bk+1 is obtained from Bk using the BFGS update formula. Then Bk+1 is positive definite if and only if ykTsk > 0. Proof. If Bk is positive definite, then it can be factored as Bk = LLT where L is a nonsingular matrix. (This is just the Cholesky factorization of Bk .) If this factorization is substituted into the BFGS formula for Bk+1 , then Bk+1 = LW LT, where

sˆ sˆ T yˆ yˆ T + T , sˆ = LTsk , and yˆ = L−1 yk . sˆ Tsˆ yˆ sˆ Bk+1 will be positive definite if and only if W is. To test if W is positive definite, we test if v TW v > 0 for all v  = 0. Let θ1 be the angle between v and sˆ , θ2 the angle between v W =I−

i

i i

i

i

i

i

418

book 2008/10/23 page 418 i

Chapter 12. Methods for Unconstrained Optimization

ˆ Then and y, ˆ and θ3 the angle between sˆ and y. ˆ 2 (v Tsˆ )2 (v Ty) + sˆ Tsˆ yˆ Tsˆ    2 2 v2 sˆ  cos2 θ1 v2 yˆ  cos2 θ2 2 = v − −      2 yˆ  · sˆ  cos θ3 sˆ  ' (   yˆ  cos2 θ2 = v2 1 − cos2 θ1 +   sˆ  cos θ3 ' (   yˆ  cos2 θ2 2 2 = v sin θ1 +   . sˆ  cos θ3

v TW v = v Tv −

If ykTsk > 0, then yˆ Tsˆ > 0 and cos θ3 > 0; hence v TW v > 0 and W is positive definite. If ykTsk < 0, then cos θ3 < 0; in this case, v can be chosen so that v TW v < 0 and so W is not positive definite. This completes the proof. The new matrix Bk+1 will be positive definite only if ykTsk > 0. This property can be guaranteed by performing an appropriate line search and so is not a serious limitation (see the Exercises). The BFGS formula is illustrated below. Example 12.11 (The BFGS Formula). We will apply the BFGS formula to the same threedimensional example that was used for the symmetric rank-one formula. Again we will choose B0 = I and x0 = (0, 0, 0)T. At iteration 0, ∇f (x0 ) = 14.4568, so this point is not optimal. The search direction is   −8 p0 = −9 −8 and α0 = 0.3333. The new estimate of the solution and the new Hessian approximation are     −2.6667 1.1021 0.3445 0.5104 and B1 = 0.3445 1.7751 1.0335 . x1 = −3.0000 −2.6667 0.5104 1.0335 2.3270 At iteration 1, ∇f (x1 ) = 3.7712, so we continue. The next search direction is   −3.2111 p1 = −0.6124 2.1223 and α1 = 0.3577. This gives the estimates    −3.8152 1.6393 and B2 = x2 = −3.2191 0.6412 −1.9076 −0.3607

0.6412 1.8600 0.6412

−0.3607 0.6412 3.6393

 .

At iteration 2, ∇f (x2 ) = 0.8397, so we continue, computing   −0.5289 p2 = 0.6268 −0.2644

i

i i

i

i

i

i

12.3. Quasi-Newton Methods and α2 = 0.3495. This gives x3 =



book 2008/10/23 page 419 i

419

−4 −3 −2



 and

B3 =

2 0 0

0 3 0

0 0 4

 .

Now ∇f (x3 ) = 0, so we stop. You may have noticed that the values of { xk } were the same here as in the previous example. This does not happen in general, but it can be shown to be a consequence of using an exact line search and solving a quadratic problem. There is a class of update formulas that preserve positive-definiteness, given by the formula (Bk sk )(Bk sk )T yk ykT Bk+1 = Bk − + T + φ(skTBk sk )vk vkT, skTBk sk yk sk where φ is a scalar and vk =

yk Bk sk − T . ykTsk sk Bk sk

The BFGS update formula is obtained by setting φ = 0. As with the BFGS update, positivedefiniteness is preserved if and only if ykTsk > 0. When φ = 1 the update is called the DFP formula, which is named for its developers, Davidon, Fletcher, and Powell. The class of update formulas is sometimes referred to as the Broyden class. We conclude this section by mentioning a convergence result for quasi-Newton methods. It applies to a subset of the Broyden class of update formulas, when the parameter satisfies 0 ≤ φ < 1. It excludes the DFP formula. In addition, the theorem assumes that ∇ 2 f (x) is always positive definite, that is, the objective function is strictly convex. Theorem 12.12. Let f be a real-valued function of n variables. Let x0 be some given initial point and let { xk } be defined by xk+1 = xk + αk pk , where pk is a vector of dimension n and αk ≥ 0 is a scalar. Assume that (i) the set S = { x : f (x) ≤ f (x0 ) } is bounded; (ii) f , ∇f , and ∇ 2 f are continuous for all x ∈ S; (iii) ∇ 2 f (x) is positive definite for all x; (iv) the search directions { pk } are computed using Bk pk = −∇f (xk ), where B0 = I , and the matrices { Bk } are updated using a formula from the Broyden class with parameter 0 ≤ φ < 1; (v) the step lengths { αk } satisfy f (xk + αk pk ) ≤ f (xk ) + μαk pkT∇f (xk ) pkT∇f (xk + αk pk ) ≥ ηpkT∇f (xk ), with 0 < μ < η < 1, and the line search algorithm uses the step length αk = 1 whenever possible.

i

i i

i

i

i

i

420

book 2008/10/23 page 420 i

Chapter 12. Methods for Unconstrained Optimization

Then lim xk = x∗ ,

k→∞

where x∗ is the unique global minimizer of f on S, and the rate of convergence of { xk } is superlinear. Proof. See the paper by Byrd, Nocedal, and Yuan (1987).

Exercises 3.1. Apply the symmetric rank-one quasi-Newton method to solve minimize f (x) = 12 x TQx − cTx with

 Q=

5 2 1

2 7 3

1 3 9



 and

c=

−9 0 −8

 .

Initialize the method with x0 = (0, 0, 0)T and B0 = I . Use an exact line search. 3.2. Apply the BFGS quasi-Newton method to solve minimize f (x) = 12 x TQx − cTx with

 Q=

3.3.

3.4. 3.5. 3.6.

5 2 1

2 7 3

1 3 9



 and

c=

−9 0 −8

 .

Initialize the method with x0 = (0, 0, 0)T and B0 = I . Use an exact line search. Let f be a strictly convex quadratic function of one variable. Prove that the secant method for minimization will terminate in exactly one iteration for any initial starting points x0 and x1 . Let C be a symmetric matrix of rank one. Prove that C must have the form C = γ wwT, where γ is a scalar and w is a vector of norm one. In the proof of Lemma 12.10, show that, if ykTsk < 0, then v can be chosen so that v TW v < 0. Let Bk+1 be obtained from Bk using the symmetric rank-one update formula. Assume that the associated quasi-Newton method is applied to an n-dimensional, strictly convex, quadratic function, and that the vectors s0 , . . . , sn−1 are linearly independent. Also assume that (yi − Bi si )Tsi = 0 for all i. Prove that Bk+1 si = yi for i = 0, 1, . . . , k, and that the method terminates in at most n + 1 iterations. Use this to prove that Bn is equal to the Hessian of the quadratic function. (This exercise makes no assumptions about the line search.)

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 421 i

421

3.7. Let Bk+1 be obtained from Bk using the update formula Bk+1 = Bk +

(yk − Bk sk )v T , v T sk

where v is a vector such that v Tsk = 0. Prove that Bk+1 sk = yk . 3.8. Let Bk+1 be obtained from Bk using the BFGS update formula. Prove that Bk+1 sk = yk . 3.9. Let Bk+1 be obtained from Bk using the BFGS update formula. Bk+1 is guaranteed to be positive definite only if ykTsk > 0. Prove that if the Wolfe condition |pT∇f (xk + αp)| ≤ η|pT∇f (xk )| is used to terminate the line search, and η is sufficiently small, then ykTsk > 0. Hence, if an appropriate line search is used, then Bk+1 will be positive definite. 3.10. Consider the class of positive-definite updates depending on the parameter φ. What is the rank of the update formula? Prove that these updates preserve positivedefiniteness if and only if ykTsk > 0. 3.11. Write a computer program for minimizing a multivariate function using the BFGS quasi-Newton algorithm. Use B0 = I as the initial Hessian approximation. Include the following details: (i) Use a backtracking line search as described in Section 11.5. Before updating Bk , check if ykTsk > 0; if this condition is not satisfied, then do not update Bk at that iteration of the algorithm. (ii) Accept x as a solution to the optimization problem if ∇f (x) /(1+|f (x)|) ≤ , or if the number of iterations exceeds Itmax. Use  = 10−8 and Itmax = 1000. (iii) Print out the initial point, and then at each iteration print the search direction, the step length α, and the new estimate of the solution xk+1 . (If a great many iterations are required, provide this output for only the first 10 iterations and the final 5 iterations.) Indicate if no solution has been found after Itmax iterations. (iv) Test your algorithm on the test problems listed here: x0 = (1, 1, 1)T f(1) (x) = x12 + x22 + x32 , f(2) (x) = x12 + 2x22 − 2x1 x2 − 2x2 , x0 = (0, 0)T f(3) (x) = 100(x2 − x12 )2 + (1 − x1 )2 ,

x0 = (−1.2, 1)T x0 = (2, −2)T

f(4) (x) = (x1 + x2 )4 + x22 , f(5) (x) = (x1 − 1)2 + (x2 − 1)2 + c(x12 + x22 − 0.25)2 ,

x0 = (1, −1)T.

For the final function, test three different settings of the parameter c: c = 1, c = 10, and c = 100. The condition number of the Hessian matrix at the solution becomes larger as c increases. Comment on how this affects the performance of the algorithm. (v) Are your computational results consistent with the theory of quasi-Newton methods?

i

i i

i

i

i

i

422

book 2008/10/23 page 422 i

Chapter 12. Methods for Unconstrained Optimization

12.4 Automating Derivative Calculations One of the disadvantages of Newton’s method is that it requires the computation of both first and second derivatives. This can be a disadvantage in two ways: (i) having to derive and program the formulas for these derivatives, and (ii) having to use these derivatives at all. The avoidance of second derivative calculations was discussed in the sections on the steepest-descent and quasi-Newton methods. Now we show how to avoid even calculating first derivatives. In this section, we describe two ways to automate derivative calculations. The first and most widely used technique is to use differences of function values to estimate derivatives. Next we discuss techniques that analyze formulas for the function value and derive exact formulas for the derivatives. Another way to automate derivative calculations is to use a modeling language to describe the optimization problem. (Modeling languages are discussed in Appendix C.) A modeling language will typically build a symbolic representation for the derivatives based on the description of the optimization problem. This useful feature of modeling languages reduces the time needed for a problem’s description and simplifies the modeling process overall. There are many important applications where it is not appropriate to calculate or estimate derivative values. In some cases the derivatives of the objective may not always exist. This can happen with “noisy” functions that are subject to random errors, perhaps because of inaccuracies that arise when computing or approximating their values. In other cases, the objective function may be computed using sophisticated algorithmic techniques that lead to discontinuities or lack of smoothness. This can occur even if the underlying mathematical formulas are differentiable. See also Section 12.5.1. In cases such as these the Newton and quasi-Newton methods can fail, or may not even be defined. It is necessary to use methods that do not rely on derivative values, either explicitly in their usage requirements, or implicitly in the derivations of the methods. Such methods are the topic of the next section.

12.4.1

Finite-Difference Derivative Estimates

Finite differencing refers to the estimation of f (x) using values of f (x). The simplest formulas just use the difference of two function values which gives the technique its name. Finite differencing can also be applied to the calculation of ∇f (x) for multidimensional problems, as well as to the computation of f (x) and the Hessian matrix ∇ 2 f (x). For a problem with n variables, computing ∇f (x) will be about n times as expensive as computing f (x), and computing ∇ 2 f (x) will be about n2 times as expensive as f (x). Hence, even though this technique relieves the burden of deriving and programming derivative formulas, it is expensive computationally. In addition, finite differencing only produces derivative estimates, not exact values. In contrast, the automatic differentiation techniques discussed in Section 12.4.2 have low computational costs and produce exact answers, but unfortunately they too have deficiencies. Finite-difference estimates can be derived from the Taylor series. In one dimension, f (x + h) = f (x) + hf (x) + 12 h2 f (ξ ).

i

i i

i

i

i

i

12.4. Automating Derivative Calculations

book 2008/10/23 page 423 i

423

A simple rearrangement gives f (x) =

f (x + h) − f (x) 1 − hf (ξ ), h 2

leading to the approximation f (x) ≈

f (x + h) − f (x) . h

This is the most commonly used finite-difference formula. It is sometimes called the forward difference formula because x + h is a shift “forward” from the point x. This formula could also have been derived from the definition of the derivative as a limit, f (x) = lim

h→0

f (x + h) − f (x) , h

but this would not have provided an estimate of the error in the formula. Example 12.13 (Finite Differencing). Consider the function f (x) = sin(x) with derivative f (x) = cos(x). The results of using the finite-difference formula f (x) ≈

sin(x + h) − sin(x) h

for x = 2 and for various values of h are given in Table 12.3. The derivation of the finite-difference formula indicates that the error will be equal to | 12 hf (ξ )|. Since ξ is between x and x + h, error ≈ | 12 hf (x)| = | 12 h(− sin(x))| = | 12 h(− sin(2))| ≈ | 12 h(−0.91)| = 0.455h. This corresponds to the results in the table for h between 100 and 10−8 , but after that the error starts to increase, until eventually the finite-difference calculation estimates that the derivative is equal to zero. This phenomenon will be explained below by examining the errors that result when finite differencing is used. We now estimate the error in finite differencing when the calculations are performed on a computer. Part of the error is due to the inaccuracies in the formula itself; this is called the truncation error: truncation error = 12 h|f (ξ )|. In addition there are rounding errors from the evaluation of the formula (f (x +h)−f (x))/ h on a computer that depend on mach , the precision of the computer calculations (see Appendix B.2). There are rounding errors from the evaluations of the function f in the numerator: (rounding error)1 ≈ |f (x)|mach

i

i i

i

i

i

i

424

book 2008/10/23 page 424 i

Chapter 12. Methods for Unconstrained Optimization

Table 12.3. Finite differencing. h

f (x)

0

−0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365 −0.4161468365

10 10−1 10−2 10−3 10−4 10−5 10−6 10−7 10−8 10−9 10−10 10−11 10−12 10−13 10−14 10−15 10−16

Estimate −0.7681774187 −0.4608806017 −0.4206863500 −0.4166014158 −0.4161923007 −0.4161513830 −0.4161472912 −0.4161468813 −0.4161468392 −0.4161468947 −0.4161471167 −0.4161448963 −0.4162226119 −0.4163336342 −0.4218847493 −0.3330669073 0

Error 4 × 10−1 4 × 10−2 4 × 10−3 4 × 10−4 4 × 10−5 4 × 10−6 4 × 10−7 4 × 10−8 3 × 10−9 6 × 10−8 3 × 10−7 2 × 10−6 8 × 10−5 2 × 10−4 6 × 10−3 8 × 10−2 4 × 10−1

which are then magnified and augmented by the division by h: (rounding error)2 ≈

|f (x)|mach + |f (x)|mach h

(the first rounding error is magnified by 1/ h and then there is an additional rounding error from the division that is proportional to the result f (x)). Under typical circumstances, when h is small and f (x) is not overly large, the first term will dominate, leading to the estimate |f (x)|mach rounding error ≈ . h The total error is the combination of the truncation error and the rounding error error ≈

1 |f (x)|mach h|f (ξ )| + . 2 h

For fixed x and for almost fixed ξ (ξ is between x and x + h, and h will be small), this formula can be analyzed as a function of h alone. To determine the “best” value of h we minimize the estimate of the error as a function of h. Differentiating with respect to h and setting the derivative to zero gives 1 |f (x)|mach |f (ξ )| − = 0, 2 h2

i

i i

i

i

i

i

12.4. Automating Derivative Calculations which can be rearranged to give

book 2008/10/23 page 425 i

425

3 h=

2|f (x)|mach . |f (ξ )|

In cases where f (x) and f (ξ ) are neither especially large nor small, the simpler approximation √ h ≈ mach can be used. If the more elaborate formula for h is substituted into the approximate formula for the error, then the result can be simplified to error ≈ 2mach |f (x) · f (ξ )|, √ or more concisely to the result that the error is O( mach ). −16 In the example above, mach ≈ 10 and the simplified formula for h yields h ≈ √ mach ≈ 10−8 . This value of h gives the most accurate derivative estimate in the example. The more elaborate formula for h yields h ≈ 2.1 × 10−8 , almost the same value. The error with this value of h is about 1.4 × 10−8 , slightly worse than the value given by the simpler formula. This does not indicate that the derivation is invalid; rather it only emphasizes that the terms used in the derivation are estimates of the various errors. As expected, the errors √ in this example are approximately equal to mach . In practical settings the value of f (ξ ) will be unknown (even the value of f (x) will be unknown) and so the more elaborate formula for h cannot be used. Some software √ packages just use h = mach or some simple modification of this formula (for example, taking into account |x| or |f (x)|). An alternative is to perform extra calculations for one value of x, perhaps the initial guess for the optimization algorithm, to obtain an estimate for f (ξ ), and then use this to obtain a better value for h that will be used for subsequent finite-difference calculations. An additional complication can arise if |x| is large. If h < mach |x|, then the computed value of x + h will be equal to x and the finite-difference estimate will be zero. Thus, in the general case the choice of h will depend on mach , |x|, and the values of |f |. For further information, see the references cited in the Notes. If higher accuracy in the derivative estimates is required, then there are two things that can be done. One choice is to use higher-precision arithmetic (arithmetic with a smaller value of mach ). This might just mean switching from single to double precision, a change that can sometimes be made with an instruction to the compiler without any changes to the program. If the program is already in double precision, then on some computers it is possible to use quadruple precision, but quadruple precision arithmetic can be much slower than double precision since the instructions for it are not normally built into the computer hardware. The other choice is to use a more accurate finite-difference formula. The simplest of these is the central-difference formula 1 f (x + h) − f (x − h) − h2 [f (ξ1 ) + f (ξ2 )]. 2h 12 It can be derived using the Taylor series for f (x + h) and f (x − h) about the point h. (See the Exercises.) f (x) =

i

i i

i

i

i

i

426

book 2008/10/23 page 426 i

Chapter 12. Methods for Unconstrained Optimization

Higher derivatives can also be obtained by finite differencing. For example, the formula f (x) =

f (x + h) − 2f (x) + f (x − h) 1 − h2 [f (4) (ξ1 ) + f (4) (ξ2 )] h2 24

can be derived from the Taylor series for f (x + h) and f (x − h) about the point x. (See the Exercises.) The derivatives of multidimensional functions can be estimated by applying the finitedifference formulas to each component of the gradient or Hessian matrix. If we define the vector ej = ( 0 · · · 0 1 0 · · · 0 )T having a one in the j th component and zeroes elsewhere, then [∇f (x)]j ≈

f (x + hej ) − f (x) . h

If the gradient is known, then the Hessian can be approximated via [∇ 2 f (x)]j k =

[∇f (x + hek ) − ∇f (x)]j ∂ 2 f (x) . ≈ ∂xj ∂xk h

For further details, see the Exercises. If it is feasible to use complex arithmetic to evaluate f (x), then an alternative way to estimate f (x) is to use f (x) ≈ [f (x + ih)]/ h, √ where i = −1 and [f ] is the imaginary part of the function f . This formula is capable of producing more accurate estimates of the derivative (sometimes up to full machine accuracy) with only one additional function evaluation, for a broad range of values of h.

12.4.2 Automatic Differentiation The goal of automatic differentiation is to use software to analyze the formulas used to evaluate f (x) and produce formulas to evaluate ∇f (x). The user might provide a computer program that evaluates f (x), and then the automatic differentiation software would take this program and produce a new program that evaluates both the function and its gradient. The technique uses the chain rule to analyze every step in the evaluation of the function, with the results being organized in such a way that the gradient is evaluated efficiently, that is, almost as efficiently as the function itself is evaluated. The resulting software for evaluating the gradient will have accuracy comparable to the software for evaluating the function. Hence, this technique not only automates the evaluation of the gradient, but does it in a way that is in general more efficient and more accurate than finite differencing. To explain automatic differentiation we first assume that the function evaluation has been decomposed into a sequence of simple calculations, each of which involves only one or two variables. The “variables” may represent intermediate results and need not correspond

i

i i

i

i

i

i

12.4. Automating Derivative Calculations x1

427 x2

x 7 = 2 x 21

x 5= x 1 x 2

x 8= e x 7

x 6= x 5 x 3

book 2008/10/23 page 427 i

x3

x9 = x 6 + x 8

Figure 12.3. Evaluation graph. to variables in the original problem. These simple calculations might be, for example, of the form x10 x12 x15 x21

= x1 + x2 = x3 x4 = 1/x5 = sin x7

and so forth. If the function evaluation is expressed in this way, it is easy to differentiate each step in the evaluation. The user need not program the function evaluation in this simple form, since the automatic differentiation software can perform this step itself. We use this representation to simplify our description of automatic differentiation. Example 12.14 (Function Evaluation). Consider the function 2

f (x1 , x2 , x3 ) = x1 x2 x3 + e2x1 . It can be evaluated as follows: x5 x6 x7 x8 x9

= x1 x2 = x5 x3 = 2x12 = e x7 = x6 + x8

and then f (x) = x9 . Each of the steps involves at most two variables. This sequence of evaluation steps can be represented by a graph. Evaluation of the function corresponds to moving through the graph from top to bottom. This is illustrated in Figure 12.3 for the function in Example 12.14. The graph, and the sequence of evaluation steps, can also be used to evaluate the gradient. For our example, f (x) = x9 = x6 + x8 .

i

i i

i

i

i

i

428

book 2008/10/23 page 428 i

Chapter 12. Methods for Unconstrained Optimization

Hence

∂f = 1. ∂x9 This is the initialization step for the gradient evaluation. Then ∂f ∂x9 ∂f = ∂x6 ∂x9 ∂x6

and

∂f ∂f ∂x9 = . ∂x8 ∂x9 ∂x8

These formulas determine the partial derivatives of f with respect to x6 and x8 . These can in turn be used to determine the partial derivatives of f with respect to x5 and x7 , and thus recursively the gradient of f . This process only requires calculating derivatives for each of the simple steps in the evaluation of f , which is easy to do. The entire process is illustrated in the next example. Example 12.15 (Gradient Evaluation). To evaluate the gradient we first set ∂f = 1. ∂x9 At the next stage ∂f ∂x9 ∂f = =1×1=1 ∂x6 ∂x9 ∂x6 ∂f ∂f ∂x9 = = 1 × 1 = 1. ∂x8 ∂x9 ∂x8 In turn we can calculate ∂f ∂x6 ∂f = = 1 × x3 = x3 ∂x5 ∂x6 ∂x5 ∂f ∂f ∂x8 = = 1 × e x7 = e x7 ∂x7 ∂x8 ∂x7 ∂f ∂f ∂x6 = = 1 × x5 = x5 ∂x3 ∂x6 ∂x3 ∂f ∂f ∂x5 ∂f ∂x7 = + = x2 x3 + 4x1 ex7 ∂x1 ∂x5 ∂x1 ∂x7 ∂x1 ∂f ∂f ∂x5 = = x1 x3 . ∂x2 ∂x5 ∂x2 The final three formulas determine the gradient. They include the intermediate variables from the evaluation of f , and so this approach assumes that both f (x) and ∇f (x) are calculated together. For efficiency, the formulas would be left in this form, but it is possible to derive gradient formulas that involve only the original variables for the problem. In this case they are 2   x2 x3 + 4x1 e2x1 . ∇f (x) = x1 x3 x1 x2

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 429 i

429

Evaluation of the gradient can be interpreted in terms of the evaluation graph. Whereas evaluating the function traverses the graph from top to bottom, evaluating the gradient traverses the graph from bottom to top. To initialize the process, the partial derivative value at the bottom node is set equal to one. (In our example, this is at the node corresponding to x9 .) Then the chain rule is used to move upward through the graph. By beginning at the bottom of the graph and moving up one level at a time, the gradient is evaluated through a sequence of calculations. This is called the reverse mode of automatic differentiation. Each step in the evaluation of f (x) is simple, involving at most two variables. As a result, each step in the evaluation of ∇f (x) is also simple. For example, if a step in the function evaluation involves the addition of two variables, x9 = x6 + x8 , then the step in the gradient evaluation involves two multiplications of derivative values, ∂f ∂x9 ∂x9 ∂x6

and

∂f ∂x9 . ∂x9 ∂x8

This analysis can be extended to show that the number of operations required to evaluate the gradient is proportional to the number of operations required to evaluate the function. It would also be possible to evaluate the gradient by starting at the top of the graph and moving downward (forward mode). This is the traditional way of deriving the formulas for the gradient. If this is done, then in general evaluating the gradient can require about n times as many arithmetic operations as evaluating the function. The efficiency of automatic differentiation depends on evaluating the gradient starting at the bottom of the graph. Even so, software for automatic differentiation exploits both modes, since both have practical advantages. Unfortunately, automatic differentiation is not a perfect technique. To be able to evaluate the gradient efficiently it may be necessary to store all the intermediate results in the evaluation of the function f . If the evaluation of f (x) involves a large number of operations, the storage requirements for automatic differentiation can potentially be large. Modern implementations of automatic differentiation make a trade-off between efficiency and storage requirements, making it feasible to apply automatic differentiation to large classes of problems.

Exercises 4.1. Apply the forward-difference formula to the function f (x) = sin(100x) at x = 1.0 with various values of h. Determine the value of h that produces the best estimate of the derivative and compare it with the value predicted by the theory. How accurate is the theoretical estimate of the error for this function? How well do the “simple” estimates of h and the error perform? 4.2. Repeat the previous problem using the central-difference formula. 4.3. Repeat the previous problem using the difference formula for the second derivative.

i

i i

i

i

i

i

430

book 2008/10/23 page 430 i

Chapter 12. Methods for Unconstrained Optimization

4.4. Apply the forward-difference formula to estimate the gradient of the function f (x1 , x2 ) = exp(10x1 + 2x22 ) at (x1 , x2 ) = (−1, 1) with various values of h. Determine the value of h that produces the best estimate of the derivative. How well do the “simple” estimates of h and the error perform? 4.5. Estimate the Hessian of the function in the previous problem using finite differencing. First do this by taking differences of gradient values, and then repeat the calculations using differences of function values. 4.6. Derive the central-difference formula in the one-dimensional case together with the formulas for the best value of h and for the error. 4.7. Derive the one-dimensional formula for the second derivative f (x) ≈

f (x + h) − f (x) h

together with the formulas for the best value of h and the value of the error. 4.8. Derive the forward-difference formula for the gradient [∇f (x)]i ≈

f (x + hei ) − f (x) h

together with the formulas for the best value of h and the value of the error. These formulas vary from component to component. What would be an appropriate “compromise” value of h that could be used for all components? 4.9. Derive the forward-difference formula for the Hessian [∇ 2 f (x)]ij =

[∇f (x + hej ) − ∇f (x)]i ∂ 2 f (x) ≈ ∂xi ∂xj h

together with the formulas for the best value of h and the value of the error. These formulas vary from component to component. What would be an appropriate “compromise” value of h that could be used for all components? 4.10. Use a Taylor series approximation to show that f (x) ≈ [f (x + ih)]/ h, √ where i = −1 and [f ] is the imaginary part of the function f . Derive a formula for the error in this approximation. Repeat Exercises 4.1 and 4.4 using this derivative estimate. 4.11. Derive the evaluation graph for the function f (x1 , x2 ) = x12 + 3x1 x2 + 7x22 . Use the graph to derive an evaluation technique for ∇f (x). Apply your technique at the point x = (4, −5)T. Use the reverse mode of automatic differentiation.

i

i i

i

i

i

i

12.5. Methods That Do Not Require Derivatives

book 2008/10/23 page 431 i

431

4.12. Derive the evaluation graph for the function f (x1 , x2 , x3 ) = 

1 x1 + x22 + x33

+ sin(x1 x2 + x1 x3 + x2 x3 ).

Use the graph to derive an evaluation technique for ∇f (x). Apply your technique at the point x = (3, 6, 10)T. Use the reverse mode of automatical differentiation. 4.13. Assume that the evaluation of f (x) involves only the operations of addition, subtraction, multiplication, and division. Prove that, if the automatic differentiation technique described in this section is used, then the number of arithmetic operations required to evaluate ∇f (x) is proportional to the number of arithmetic operations required to evaluate f (x). 4.14. Consider the function f (x1 , . . . , xn ) = x1 x2 · · · xn . Show that the number of arithmetic operations required to evaluate ∇f (x) using automatic differentiation is O(n), whereas the number of arithmetic operations required to naively evaluate the gradient is O(n2 ). Evaluate the gradient by moving through the evaluation graph from top to bottom and show that this corresponds to using the “naive” formulas.

12.5

Methods That Do Not Require Derivatives

It is sometimes inconvenient, difficult, or impossible to calculate the derivatives of a function. For example, the function might not be differentiable at every point, so the derivative might not exist. Or the function evaluation might be carried out in terms of a long calculation involving auxiliary software—perhaps the solving of a differential equation or the running of a simulation—making it difficult to derive derivative formulas even if they exist. In these latter cases the function values might only be accurate to a few digits, so finite differencing would not be effective either. In such cases it is desirable to have available optimization methods that do not require the calculation of derivative values. This requirement puts a severe handicap on a method, since even the optimality tests are based on derivative values. Even if such a method were given the solution to the optimization problem, it might require considerable computational effort before the method could identify such a point as the solution. It might seem that such methods would, by necessity, fall outside the framework that we developed in Chapter 11. It is true that these methods are not directly related to Newton’s method, since they cannot compute a gradient, and hence cannot compute a descent direction based on the gradient; also they cannot assess a step length using a sufficient descent condition, since that too depends on the gradient; and so forth. What is surprising is that a large collection of derivative-free methods are guaranteed to converge, with a convergence theorem that is similar to the convergence theorem for line search methods discussed in Chapter 11. The assumptions on the objective function are the same for both convergence theorems, and the conditions on the methods are similar. This

i

i i

i

i

i

i

432

book 2008/10/23 page 432 i

Chapter 12. Methods for Unconstrained Optimization

is remarkable since the conditions involve the gradient of the objective function, and the derivative-free methods do not compute gradients. Derivative-free methods are easy to use. If it is possible to evaluate the objective function, then it is possible to use the methods. In addition, derivative-free methods are suitable for parallel computers, more so than Newton-type methods. It is gratifying that the methods have these good properties, along with guarantees of convergence. One deficiency of derivative-free methods is their slow convergence. Another is that they are ill suited for large problems. Use of high-performance computers can ameliorate these deficiencies.

12.5.1

Simulation-Based Optimization

The most important setting for derivative-free optimization is the case where the evaluation of the objective function is based on auxiliary software, that is, the function values are obtained from a simulation. Suppose you are trying to design a car and would like the surface of the car to have low air resistance. You might develop a computer simulation that calculates the air flow and air resistance for a particular design. This itself could be challenging, since it involves the simulation of fluid flow at high speeds, with the potential for turbulence and wind vortices. Once this model had been perfected, the next goal would be to determine an optimal design, or at least an improved design. Presumably the preliminary design sketches would determine the approximate shape of the car, and the optimization would be used to refine this design, perhaps by adjusting the values of a relatively small number of design variables. For example, the design variables might represent the angle of the windshield, the wheel base, etc. Given the complexity of the formulas for air flow and air resistance, it might be difficult to derive formulas for the derivative values required by a quasi-Newton method. In addition to the challenges of deriving the necessary formulas, there would be challenges in implementing the formulas in software. This would be compounded because the underlying simulation software for computing these function values would almost certainly have been prepared by others, perhaps another company, with the source code unavailable. This might seem like a good setting for using finite-difference approximations to the gradient. In this case there are a small number of variables, the function values can be computed by the auxiliary software, and there is some hope that the function is differentiable. But this is not the case. One reason is that the solution of the air-flow model might not be computed to high accuracy. Even with sophisticated machining equipment, the settings of the equipment would only be accurate to perhaps 3–4 digits. It would not make sense to solve the airflow simulation to high accuracy given the limitations of machining. This would mean that the function values would be accurate to about 4 digits, and the resulting finite-difference gradient values would be accurate to only about 2 digits. (The errors in the gradient values are proportional to the square root of the error in the function values; see Section 12.4.1.) With gradients of this low accuracy, a quasi-Newton method would likely perform poorly. There is another reason why it is inappropriate to use a finite-difference gradient, a reason that is more serious and that becomes more prominent as the auxiliary software becomes more sophisticated. Consider a simplified one-variable example with an objective

i

i i

i

i

i

i

12.5. Methods That Do Not Require Derivatives function defined in terms of an integral:



book 2008/10/23 page 433 i

433

b

f (x) =

g(x, y) dy. a

We will assume that we know the formula for the function g(x, y), but that a formula for the integral is not available, since such a formula may not even exist. Simple algorithms approximate an integral by a weighted sum of function values: fˆ(x) =

k

αk g(x, yk ),

i=1

where αk are specified constants and yk are specified values of y in the interval [a, b]. If g(x, y) is a differentiable function, then so are f and fˆ:  b ∂ g(x, y) dy f (x) = ∂x a k

∂ ˆ αk g(x, yk ). f (x) = ∂x i=1 This is a simplistic way of estimating integrals, since the same formula is used regardless of the values of a, b, and x, and regardless of the behavior of the function g. More sophisticated software for estimating integrals does not use a single formula, but rather uses an adaptive algorithm that changes the calculations based on the behavior of the underlying function. For example, if the function g(x, y) is changing rapidly, then a more elaborate calculation will be used. This approach makes it possible to compute accurate approximations to the integral with minimal computational effort. Suppose we want to solve  b g(x, y) dy minimize f (x) = a

and that we use sophisticated software to estimate the integrals that define f (x). Then it is possible, indeed likely, that as x changes, the formula used to estimate the integral also changes. Every change in the formula is likely to introduce nonsmoothness or even a discontinuity in the computed objective function. The effects on the objective function may be small, but they can have a large effect on the computation of a finite-difference gradient because of the division by the small finite-difference parameter h. This is illustrated in Figure 12.4. The graph on the left was obtained by using an adaptive algorithm to approximate an integral. On the right is a blowup of one portion of the graph. It is clear that the approximation is not differentiable. In summary, by using sophisticated software to estimate a smooth function f (x), we can create an optimization problem involving a nonsmooth function. These difficulties are common when using auxiliary software. Adaptive algorithms are widely used to solve differential equations, for example. If the objective function, as computed, is not differentiable, then it is not possible to use finite-difference approximations. The adaptivity of the algorithm may also make it impossible to use automatic differentiation. Use of a Newton-type method would require you to derive and program analytic formulas for the required derivatives.

i

i i

i

i

i

i

434

book 2008/10/23 page 434 i

Chapter 12. Methods for Unconstrained Optimization

0.7 0.65 0.6 0.649 0.5

0.648

0.647 f(x)

f(x)

0.4

0.646

0.3 0.645 0.2

0.644

0.643

0.1

0.642 0

0

0.5

1 x

1.5

2

1.65

1.7 x

1.75

Figure 12.4. Side effects of adaptive algorithms. In cases like these, derivative-free methods can be an attractive choice. If it is possible to evaluate the objective function, then it is possible to apply a derivative-free method. Whether the function is evaluated naively, or via sophisticated techniques, the derivativefree methods are an available tool.

12.5.2

Compass Search: A Derivative-Free Method

A great many derivative-free methods are based on the following basic template: Start with some trial point x. Evaluate the objective function at the point x and at a set of points in a specified pattern about x. If a better point is found (that is, one with a smaller function value), then this point becomes the new trial point and the process repeats. Otherwise, the size of the pattern is reduced and the current trial point retained. This continues until the size of the pattern is reduced below some tolerance, and then the current trial point is returned as the estimate of the solution. If the pattern is appropriately designed, and if the function being minimized is continuously differentiable, then it is possible to prove that   lim ∇f (x(k) ) = 0, k→∞

i

i i

i

i

i

i

12.5. Methods That Do Not Require Derivatives

book 2008/10/23 page 435 i

435

where the points x(k) are the trial points corresponding to the iterations where the pattern is reduced in size. Since the pattern is reduced only when no better point is found, these are referred to as the “unsuccessful” iterations. At “successful” iterations a better point is found, and the size of the pattern is unchanged. Let us look more closely at one of these methods. We will do this for a two-dimensional minimization problem so the results can be displayed graphically. Later we will mention how to extend the method to problems with more than two variables. The method we will consider is called compass search because the pattern corresponds to the points of a compass. We will evaluate the objective function at the trial point x = (x1 , x2 )T, as well as at the points   0 North : x + 1   0 South : x + −1   1 East : x + 0   −1 West : x + 0 for some scalar value that determines the size of the pattern. Example 12.16 (Compass Search Method). We apply the compass search method to the problem minimize f (x1 , x2 ) = x12 + 3x22 + 2x1 x2 + x1 + 3 whose solution is x∗ = (0.25, −0.75)T. We start with the initial values x0 = ( 2 0 = 2.

0.75 )T

At the first iteration we compute f (x0 ) = 13.6875   f x0 + 0 (1, 0)T = 30.6875   f x0 − 0 (1, 0)T = 4.6875   f x0 + 0 (0, 1)T = 42.6875   f x0 − 0 (0, 1)T = 8.6875. Since the smallest value is obtained at the new point x0 − 0 (1, 0)T = (0, 0.75)T, we consider this to be a successful iteration and set x1 = (0, 0.75)T and 1 = 0 = 2. This completes the first iteration. It would also have been valid to accept x0 − 0 (0, 1)T = (2, −1.25)T as the new point, since this also improves the value of the objective function. The first few iterations of the compass search method are illustrated in Figure 12.5. The figure shows the contours of the objective function with the minimizer marked with a +. At each successful iteration, the point with the smallest function value is chosen as the new point. This point on the compass pattern is marked with a ∗.

i

i i

i

i

i

i

436

Chapter 12. Methods for Unconstrained Optimization Iteration 1

Iteration 2

Iteration 3

5

5

5

0

0

0

–5 –5

0

5

–5 –5

Iteration 4

0

5

–5 –5

Iteration 5 5

5

0

0

0

0

5

–5 –5

0

0

5

Iteration 6

5

–5 –5

book 2008/10/23 page 436 i

5

–5 –5

0

5

Figure 12.5. Compass search method. The first two iterations are successful, giving x1 = (0, 0.75)T and x2 = (−2, 0.75)T. The third iteration is unsuccessful, so x3 = x2 and 3 = 2 /2 = 1. The fourth iteration is successful, giving x4 = (−1, 0.75)T. The fifth iteration is unsuccessful, so x5 = x4 and 5 = 4 /2 = 0.5. If the iteration is continued, the algorithm converges to the solution x∗ = (0.25, −0.75)T. It is easy to extend the compass search method to n dimensions. In general, the objective function is evaluated at the trial point x and at the points x + di , where di is either a coordinate direction or its negative. For example, d1 = (1, 0, 0, . . . , 0)T d2 = −(1, 0, 0, . . . , 0)T d3 = (0, 1, 0, . . . , 0)T d4 = −(0, 1, 0, . . . , 0)T .. .

i

i i

i

i

i

i

12.5. Methods That Do Not Require Derivatives

book 2008/10/23 page 437 i

437

Except for the increase in the number of trial points, the method remains unchanged. Here is the algorithm. Algorithm 12.2. Compass Search Algorithm 1. Specify some initial guess of the solution x0 , an initial pattern size 0 > 0, and a convergence tolerance tol > 0. 2. For k = 0, 1, . . . (i) (ii) (iii) (iv)

If k < tol , stop. Evaluate f at the points xk and xk + k di , for i = 1, . . . , 2n. If f (xk + k di ) < f (xk ) for some i, then set xk+1 = xk + k di and k+1 = k . Otherwise, set k+1 = k /2.

The efficiency of the compass search method depends critically on the choice of the initial pattern size 0 . If 0 is chosen too small and if x0 is far from the solution, it may take many iterations to get close to the solution. If 0 is chosen too large, it may take many iterations to reduce k below the tolerance tol . The compass search algorithm allows some choice in the selection of xk1 , since it is possible to choose any i for which f (xk + k di ) < f (xk ). It is possible to exploit this flexibility when using the algorithm, for example, by terminating an iteration as soon as a better point is found. More importantly, it is possible to evaluate multiple function values { f (x + di ) }2n i=1 simultaneously on the various processors of a parallel computer. In cases where the function evaluations are expensive, such as when they involve some auxiliary simulation, this can dramatically accelerate the compass search algorithm. If sufficient processors are available, it is possible to expand the set of directions { di } by including additional directions beyond just the coordinate directions and their negatives. This can further accelerate the algorithm. Compass search is a slow but sure method. It is guaranteed to make progress towards a solution, but might do so slowly. For this reason, the convergence tolerance tol is commonly set, so a coarse estimate of the solution is accepted.

12.5.3

Convergence of Compass Search

It is possible to prove a convergence theorem for compass search that is remarkably similar to the convergence theorem for line search methods (see Section 11.5). It will be necessary to make some assumptions about the objective function, and indeed we will make the same assumptions as before. Namely, we will assume that (i) the set S = { x : f (x) ≤ f (x0 ) } is bounded, and (ii) ∇f is Lipschitz continuous for all x, that is, ∇f (x) − ∇f (y) ≤ L x − y for some constant 0 < L < ∞. The first assumption assures that the method will not continue indefinitely evaluating points in an unbounded region. Some variant of the second assumption is necessary to guarantee that the algorithm will converge.

i

i i

i

i

i

i

438

book 2008/10/23 page 438 i

Chapter 12. Methods for Unconstrained Optimization

Let us look more closely at an iteration of compass search, and in particular at what happens at an unsuccessful iteration where a better point cannot be found. Suppose that the current trial point is not a stationary point. Then ∇f (xk ) = 0. In the two-dimensional case it is obvious that, no matter what the value of the gradient, the steepest-descent direction −∇f (xk ) is within 45◦ of one of the compass directions di . Let d be a compass direction that satisfies this condition. Then −

1 d T∇f (xk ) ≥ cos(45◦ ) = √ > 0. d · ∇f (xk ) 2

This is condition (iii) from the line search theorem −

pkT∇f (xk ) ≥>0 pk  · ∇f (xk )

√ with  = 1/ 2. In n dimensions it is possible to show that −

d T∇f (xk ) 1 ≥ √ >0 d · ∇f (xk ) n

for at least one of the compass directions d. (See the Exercises.) Thus there is always a direction d that satisfies a sufficient descent condition. This condition can be rearranged as 1 √ d · ∇f (xk ) ≤ −d T∇f (xk ). n At an unsuccessful iteration, f (xk + k d) ≥ f (xk ). We can use the mean-value theorem to conclude that 0 ≤ f (xk + k d) − f (xk ) = k d T∇f (xk + η k d) for some η between 0 and 1. (See Section 2.6.) If we divide by k and then subtract d T∇f (xk ) from both sides, we obtain −d T∇f (xk ) ≤ d T[∇f (xk + η k d) − ∇f (xk )]. Now substitute the rearranged sufficient descent condition into this formula: 1 √ d · ∇f (xk ) ≤ d T[∇f (xk + η k d) − ∇f (xk )] n ≤ d · ∇f (xk + η k d) − ∇f (xk ) . Earlier we assumed that the gradient of the objective function ∇f (x) was Lipschitz continuous with constant L. Applying this assumption to the right-hand side gives 1 √ d · ∇f (xk ) ≤ d · L η k d ≤ L k d2 . n Since the compass directions all satisfy d = 1, this simplifies to √ ∇f (xk ) ≤ nL k .

i

i i

i

i

i

i

12.5. Methods That Do Not Require Derivatives

book 2008/10/23 page 439 i

439

We have been able to derive a bound on ∇f (xk ) at an unsuccessful iteration of the compass search method, even though the method does not use any gradient information. This is enough to provide us with our convergence result. If we only consider the unsuccessful iterations x(k) , then  √  lim ∇f (x(k) ) ≤ nL lim (k) . k→∞

k→∞

At every unsuccessful iteration, k+1 = k /2, and k is never increased. Since the level sets are bounded, for each value of there can only be a finite number of successful iterations. (See the Exercises.) Thus the limit of the right-hand side is zero and   lim ∇f (x(k) ) = 0. k→∞

If the assumptions about the objective function are satisfied, the compass search method is guaranteed to converge. A formal statement of the theorem is given below. Theorem 12.17 (Convergence of Compass Search). Let f be a real-valued function of n variables. Let x0 be a given initial point and determine { xk } using the compass search algorithm with initial pattern size 0 . Assume that (i) the set S = { x : f (x) ≤ f (x0 ) } is bounded; (ii) ∇f is Lipschitz continuous for all x, that is, ∇f (x) − ∇f (y) ≤ L x − y , for some constant 0 < L < ∞.

Let x(k) be the set of unsuccessful iterations, i.e., the iterations where a better point cannot be found and k is reduced. Then   lim ∇f (x(k) ) = 0.

k→∞

It is also possible to determine the rate of convergence for the compass search algorithm. If additional assumptions are made, then it can be shown that at the unsuccessful iterations,   x(k) − x∗  ≤ c (k) for some constant c that does not depend on k. This is similar to, but not the same as, a linear rate of convergence. There are several differences between this result and linear convergence. First, in this result we consider only unsuccessful

iterations and ignore successful iterations. Second, the result shows only that x(k) − x∗ is bounded by a linearly conver

gent series. At each unsuccessful iteration we divide (k) by 2, so the

sequence (k) converges linearly to zero. This does not guarantee that x(k) − x∗ converges linearly. (See the Exercises.) Nevertheless it is similar to linear convergence, and this property is sometimes referred to as “r-linear” convergence.

i

i i

i

i

i

i

440

book 2008/10/23 page 440 i

Chapter 12. Methods for Unconstrained Optimization

In contrast, the steepest-descent method from Section 12.2 converges linearly, i.e., at a faster rate than the compass search method.

Exercises 5.1. Fill in the details of the iterations of the compass search method for Example 12.16. 5.2. Apply the compass search method to the problem minimize f (x1 , x2 ) = (x1 + x2 + 4)2 + (x1 − x2 + 3)2 using the initial point x0 = (1, 5)T and 0 = 6. Perform at least four iterations of the method. 5.3. Apply the compass search method to the problem minimize f (x1 , x2 , x3 ) = x12 + 2x22 + 3x32 using the initial point x0 = (1, 2, 1)T and 0 = 3. Perform at least five iterations of the method. 5.4. Variants of compass search can be developed using different sets of search directions. For example, the directions could be based on the corners of a box or cube centered about the origin. In two dimensions this gives the directions di = (±1, ±1)T: d1 = ( 1 1 )T d2 = ( 1 −1 )T d3 = ( −1 1 )T d4 = ( −1

5.5.

5.6.

5.7.

5.8.

−1 )T .

In three dimensions this gives the directions di = (±1, ±1, ±1)T. Repeat the previous two problems using this variant of compass search. This is sometimes called box search. If compass search is used to solve an n-dimensional problem, how many directions di are needed? How many directions are needed for box search in this case? Which method is preferable as n increases? Program the compass search algorithm, and apply it to the problem in Example 12.16 with tol = 10−5 . In your program, choose the best value of xk + k di at each iteration. At which iteration is xk = x∗ ? How many additional iterations are required before the algorithm terminates? Repeat the previous problem, but choose the first value of xk + k di that yields a better function value. How do the two versions of the algorithm compare? Be sure to take into account the number of function evaluations required to find a solution, and not just the number of iterations. The compass search algorithm terminates when k < tol . Apply the compass search algorithm to the minimization problems in the previous problems and compare

i

i i

i

i

i

i

12.6. Termination Rules

book 2008/10/23 page 441 i

441

k and ∇f (xk ) at the unsuccessful iterations. (You should use a small value of tol .) Is the value of k an effective substitute for the value of ∇f (xk ) in the convergence test? (It would be desirable to use ∇f (xk ) in the convergence test, but compass search is often used when it is impossible to compute ∇f (xk ).) 5.9. Repeat the previous exercise, but compare k and ∇f (xk ) at all iterations, both successful and unsuccessful. Can you identify a relationship between these two sets of values? 5.10. Consider the two-variable problem

minimize f (x) = 21 max x − c2 , x − d2 , where c = (1, −1)T and d = −c. (i) Prove that the function is continuous and strictly convex, but that its gradient is discontinuous at points of the form xˆ = (a, a)T. (ii) Prove that the minimizer of f (x) is x∗ = (0, 0)T. (iii) Let x0 = (a, a)T for some a = 0. Prove that any positive value of 0 will result in an unsuccessful iteration of the compass search algorithm. Use this result to prove that the compass search algorithm will terminate at (a, a)T and make no progress towards the solution. (iv) Program the compass search algorithm and run it on this example. Use initial guesses of the form x0 = (a, a)T as well as points that do not lie on this line. Is compass search able to find the minimizer of this function? 5.11. Give an example of a sequence { yk } that satisfies |yk | ≤ 1/2k , but where the sequence does not converge linearly. This shows that a sequence that converges “r-linearly” need not converge linearly. 5.12. In the compass search method, prove that for each value of there can only be a finite number of successful iterations if the level sets are bounded. 5.13. Let f (x) be a function of n variables and assume that ∇f (xk ) > 0. Prove that there is at least one compass direction d that satisfies −

d T∇f (xk ) 1 ≥ √ > 0. d · ∇f (xk ) n

12.6 Termination Rules Ideally an algorithm for unconstrained optimization would terminate at an estimate of the solution xk that satisfied ∇f (xk ) = 0

and

∇ 2 f (xk ) positive semidefinite.

There are two reasons why this is not realistic. First, it is unlikely that the calculated value of the gradient would ever be exactly zero because of rounding errors in computer

i

i i

i

i

i

i

442

book 2008/10/23 page 442 i

Chapter 12. Methods for Unconstrained Optimization

calculations. Second, even if there are no rounding errors, no algorithm is guaranteed to find such a point in a finite amount of time. Another difficulty, although not as serious, is that many commonly used algorithms for unconstrained optimization do not have available to them the Hessian matrix ∇ 2 f (xk ), and so cannot directly verify if this matrix is positive semidefinite. As an alternative, we might consider replacing the above conditions by the test ∇f (xk ) ≤  for some small number . This immediately raises the question of how small to make . If (say) 16-digit arithmetic were used, then perhaps  ≈ 10−16 would be appropriate. In Section 2.7, we have shown that if the error in the function value |f (xk ) − f (x∗ )| is O(h), then the √ norm of the gradient ∇f (xk ) and the errors in the variables xk − x∗  will both be O( h), suggesting that a value √  ≈ 10−16 = 10−8 would be more appropriate. Suppose now that the objective function were changed by changing the units in which it was measured. For example, suppose that instead of measuring the objective in terms of kilometers it were now measured in terms of millimeters. This would cause the objective function to be multiplied by 106 , and hence would cause ∇f (xk ) to be multiplied by 106 . This minor change to the objective function would make the convergence test much more difficult to satisfy, even though the underlying optimization problem was essentially unchanged. To alleviate this difficulty, the convergence test could be modified to ∇f (xk ) ≤ |f (xk )|, √ where  ≈ mach , in this case  ≈ 10−8 . This test is also flawed. If the optimal value of the objective function is zero (which is not uncommon when least-squares problems are solved), then this convergence test will be unnecessarily stringent and may very well be impossible to satisfy. We are thus led to consider a convergence test of the form ∇f (xk ) ≤ (1 + |f (xk )|) which attempts to cope with all the above-mentioned difficulties. When |f (xk )| is close to zero, this test resembles our original test, whereas when |f (xk )| is large, it resembles our second test. When Newton’s method is being used, it is also appropriate to ask that ∇ 2 f (xk ) be positive semidefinite. Due to the properties of rounded arithmetic, however, we weaken this requirement and only demand that ∇ 2 f (xk ) + I be positive semidefinite. (The choice of  is discussed below.) Since a factorization ∇ 2 f (xk ) is normally computed to determine the search direction in Newton’s method, this test can be performed at low cost as a by-product of the method. (See Section 11.4.)

i

i i

i

i

i

i

12.6. Termination Rules

book 2008/10/23 page 443 i

443

Since it is not possible to design a perfect convergence test for terminating an algorithm, it is common to insist that additional tests be satisfied before a point xk is accepted as an approximate minimizer of the function f . For example, the algorithm might attempt to ensure that the sequences { f (xk ) } and { xk } are both converging. The combined test might take the form ∇f (xk ) ≤ 1 (1 + |f (xk )|) f (xk−1 ) − f (xk ) ≤ 2 (1 + |f (xk )|) xk−1 − xk  ≤ 3 (1 + xk ) ∇ 2 f (xk ) + 4 I is positive semidefinite. The fourth test on ∇ 2 f (xk ) would be performed only if the Hessian matrix were available. The tolerances i should be selected based on the accuracy of the computer calculations. The tolerance 2 should represent the accuracy with which the function and derivative values can be calculated. If they can be calculated to full machine accuracy, then it is appropriate to take 2 = mach , or perhaps some multiple of mach that depends on the number of variables in the problem. If the function and derivative values are only accurate to, say, 8 digits, then 2 = 10−8 is a more appropriate choice. (Such a choice would be necessary, for example, if finite-difference derivative estimates were used; see  Section 12.4.1.) Under many circumstances, it will be appropriate to choose 4 = 2 ∇ 2 f (xk ), unless the accuracy of the Hessian calculations is different from that of the function and gradient values. Since xk and ∇f (xk ) can only be expected to have half the precision of f (xk ) (see √ Section 2.7), we are led to choose 1 = 3 = 2 . The book by Gill, Murray, and Wright √ (1981) recommends the larger value 1 = 3 = 3 2 , based on computational tests that the authors have performed. The tests on ∇f (xk ) and xk both are based on norms. If, for example, ∇f (xk ) = (γ , . . . , γ )T, then √ ∇f (xk )2 = n|γ | and ∇f (xk )∞ = |γ |, where n is the number of variables. If n is large, then the 2-norm of the gradient can be large even if γ is small. This can distort the convergence tests and so it is wise to use the infinity norm when large problems are solved. The use of norms in the convergence tests can have other side effects. Suppose that xk−1 = ( 1.44453 xk = ( 1.44441

0.00093 0.00012

0.0000079 ) T 0.0000011 ) T.

If we had chosen 3 = 10−3 , then  xk−1 − xk ∞ = ( 0.00012

0.00081

 0.0000068 )T 

= 0.00081 ≤ 3 xk  = 1.44441 × 10−3 and so xk would pass this test. If, for our application, it was important that the significant digits of all the variables be accurate, then xk would not be satisfactory since its second

i

i i

i

i

i

i

444

book 2008/10/23 page 444 i

Chapter 12. Methods for Unconstrained Optimization

and third components are still changing in their first significant digit. The use of norms emphasizes the larger components in a vector, and so the smaller components may have poor relative accuracy. This effect can be ameliorated by scaling the variables. Suppose that we knew that 10−4

x∗ ≈ ( 1

10−6 )T .

(We might know this from practical experience, or from a previous attempt at computing x∗ .) Then we could perform a change of variables x → xˆ so that xˆ∗ ≈ ( 1

1 )T .

1

At the optimum, all the variables in the transformed problem would have approximately the same relative accuracy. In this case the change of variables would be x = ( x1

x2

x3 )T → ( x1

ˆ 106 x3 )T = x.

104 x2

Note that the formulas for f and ∇f would have to be adjusted accordingly. Example 12.18 (Scaling). Consider the quadratic function f (x) = 12 x TQx − cTx, where

 Q=

8 3 × 104 0

3 × 104 4 × 108 1 × 1010

0 1 × 1010 6 × 1012



 and

c=

11 8 × 104 7 × 106

 .

This function has a minimum at x∗ = Q−1 c = ( 1

10−4

10−6 )T .

We make the change of variable xˆ = Dx, where

 D=

1 0 0

0 104 0

0 0 106

 ,

and let fˆ be the transformed function. Then x = D −1 x, ˆ or x1 = xˆ1 ,

x2 = 10−4 xˆ2 ,

and

x3 = 10−6 xˆ3 .

Substituting into the formulas for f and ∇f gives fˆ(x) ˆ = 12 xˆ T(D −1 QD −1 )xˆ − (D −1 c)Txˆ and

∇ fˆ(x) ˆ = (D −1 QD −1 )xˆ − (D −1 c),

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 445 i

445

where



8 3 D QD = 3 4 0 1 The minimizer of the scaled function is −1

−1

0 1 6



 and

−1

D c=

xˆ∗ = (D −1 QD −1 )−1 (D −1 c) = ( 1 Notice that

1

11 8 7

 .

1 )T .

∇ fˆ(x) ˆ = D −1 ∇f (x).

This result can be derived directly using the chain rule (see below). In general suppose we perform a change of variable of the form x → Dx = x, ˆ where D is an invertible scaling matrix. Then by the chain rule, fˆ(x) ˆ = f (D −1 x) ˆ = f (x)

and

∇ fˆ(x) ˆ = D −1 ∇f (D −1 x) ˆ = D −1 ∇f (x).

Once the minimization has been performed with respect to the variables x, ˆ the solution to the original problem is obtained from x∗ = D −1 xˆ∗ .

Exercises 6.1. Suppose that a change of variables of the form x → Dx = xˆ has been performed, where D is an invertible matrix. What is the formula for ∇ 2 fˆ(x)? ˆ 6.2. Suppose that a change of variables of the form x → Dx = xˆ has been performed, where D is an invertible matrix. Prove that the Newton direction (in terms of the original variables) is unchanged. Under what conditions on D are the steepest-descent and the BFGS quasi-Newton directions unchanged? 6.3. Suppose that a change of variables of the form x → Dx = xˆ + v has been performed, where D is an invertible matrix and v is a nonzero vector. Determine the formulas for fˆ(x), ˆ ∇ fˆ(x), ˆ and ∇ 2 fˆ(x). ˆ Apply your results to the function in Example 12.18 using   1 3 0 3 and v = ( 4 7 2 ) . D = 0 10 5 0 0 105

i

i i

i

i

i

i

446

book 2008/10/23 page 446 i

Chapter 12. Methods for Unconstrained Optimization

6.4. Use Newton’s method (with or without a line search) to solve minimize f (x1 , x2 ) = 5x14 + 6x24 − 6x12 + 2x1 x2 + 5x22 + 15x1 − 7x2 + 13. Use the initial guess (1, 1)T, and use the termination rules derived in this section. Experiment with the choices of 1 –4 , and determine how small you can make them before you reach the limits of the precision on your computer. 6.5. Repeat the previous problem using the steepest-descent method. You need not test if the Hessian at xk is (approximately) positive semidefinite.

12.7

Historical Background

Many of the ideas in this chapter owe a great debt to Isaac Newton, and in particular to his manuscripts of the 1660s.11 In these manuscripts Newton examines the roots of polynomial equations from both a numerical and an analytic point of view and develops a technique (now called Newton’s method) for approximating these roots to any desired accuracy. Newton’s own derivation is different from ours, and we present it here, using the example that Newton himself employed: x 3 − 2x − 5 = 0. The first step is to find an integer adjacent to a root. A few simple calculations indicate that there is a root between 2 and 3, and so 2 is an acceptable initial guess. The root can be written as x∗ = 2 + p for some p. Substituting this into the cubic polynomial gives p3 + 6p 2 + 10p − 1 = 0. Since |p| < 1, the terms p3 + 6p 2 “are neglected on account of their smallness” leaving us with the approximate equation 10p − 1 = 0, or p ≈ 0.1, “very nearly true.” We now repeat this process, applying it to p instead of x. The exact value of p will satisfy p = 0.1 + q for some q, and this expression can be substituted into the cubic equation for p, giving q 3 + 6.3q 2 + 11.23q + 0.061 = 0. 11 Newton’s manuscripts are available in an edition due to D. T. Whiteside that includes the Latin original, an English translation, and extensive annotations.

i

i i

i

i

i

i

12.7. Historical Background

book 2008/10/23 page 447 i

447

If the terms q 3 + 6.3q 2 are ignored, we solve for q in 11.23q + 0.061 = 0, obtaining q ≈ −0.0054. Repeating this procedure one more time using q = −0.0054 + r gives (after ignoring nonlinear terms) the equation 0.000541708 + 11.16196r = 0 or r ≈ −0.00004853. Combining these results together gives x∗ ≈ 2.09455147. The root is x∗ = 2.0945514815 . . . . Newton goes on, a few pages later, to show how to use his technique to obtain analytic series approximations to roots of polynomial equations. He also points out that a quadratic equation could be solved to obtain the update to the solution (for example, p could be obtained by solving 6p 2 + 10p − 1 = 0) and thus improve the convergence rate of the method. His comments indicate that he is aware that his basic method converges at a quadratic rate, and that using a quadratic equation would cause it to converge at a cubic rate. The approach used by Newton solves a nonlinear equation by guessing at a solution, approximating the nonlinear equation near that guess by a linear equation (in fact the equation for the tangent line), and using that linear approximation to obtain a new guess of the solution. This is the same approach used in Chapter 2 to derive Newton’s method, but the organization of the calculations used there is different. The algorithm in Chapter 2 was used by Joseph Raphson in 1690, although Raphson did not refer to derivatives. Raphson was aware of Newton’s work, but he did not realize that the two methods were equivalent. From a practical, pencil-and-paper point of view the methods are different. Newton’s original formulation requires that a new polynomial be derived every time the estimate of the solution is refined, whereas Raphson’s version always works with the original polynomial. It is also more obvious how to generalize Raphson’s formula to more general nonlinear functions. For these reasons, the more modern formulas are often referred to collectively as the Newton–Raphson method. (Further information about Raphson can be found in the paper by Bic´ anic´ and Johnson (1979).) Many other important enhancements, such as the interpretation of the method using derivatives, are due to Thomas Simpson (1740). A more detailed history of Newton’s method can be found in the paper by Ypma (1995). This was not the first approach that Newton had used to solve polynomial equations. In late 166412 Newton examined existing algorithms due to Viète and Oughtred; these methods converge linearly, finding the root one digit at a time. In early 1665 Newton discovered the secant method. His derivation appears to be based on geometric reasoning, although he does not include a diagram. Other relevant results that can be found in Newton’s manuscripts include the Taylor series and Horner’s rule for evaluating a polynomial. Newton was averse to publishing many of his results. However, some of his manuscripts were circulated during and after his lifetime, inspiring publications by other British scientists such as Raphson, 12 Many of Newton’s manuscripts cannot be precisely dated; the dates given here are those proposed by Whiteside.

i

i i

i

i

i

i

448

book 2008/10/23 page 448 i

Chapter 12. Methods for Unconstrained Optimization

Taylor, Horner, Halley, Maclaurin, Simpson, and others, and it is those publications that give these results their modern names. It would be pleasing to report that Newton was the first to discover Newton’s method, but this is not the case. For example, according to Whiteside, a “primitive form of it” was used to solve x n − a = 0 by the “fifteenth-century Arabic mathematician al-K¯aš¯ı.” It appears, however, that Newton was unaware of these earlier developments. The optimality conditions for one-dimensional optimization problems were known to Newton, and were developed as he developed his calculus. The corresponding conditions for multidimensional problems were known to Simpson, although there is indirect evidence that Newton may have known these as well. The multidimensional version of Newton’s method is also due to Simpson. Multidimensional versions of the secant method (i.e., quasi-Newton methods) were developed by Davidon in 1959, although his report was not published until 1991; the first published account of these techniques was by Fletcher and Powell in (1963) and was based on Davidon’s technical report. The steepest-descent method was developed by Cauchy in 1847. He discussed it as a technique for solving a nonlinear equation of the form f (x1 , . . . , xn ) = 0, where f is a real-valued function that cannot take on negative values. This is the same as solving minimize f (x1 , . . . , xn ), and the fact that in Cauchy’s case the optimal value of f is zero is but a minor technicality. Cauchy, like Gauss, was motivated by the study of planets and comets, and his specific motivation was presented in a paper he published earlier the same year.

12.8

Notes

Quasi-Newton Methods—Although the BFGS formula is the most widely used of the quasiNewton formulas for optimization, the symmetric rank-one formula also has desirable properties. The relative merits of the two methods have been studied in several papers (see, for example, Nocedal (1991)), and these studies may lead to modifications in the way quasi-Newton methods are programmed. The symmetric rank-one formula must be used with some care, since the denominator in the update can be zero or negative, leading to computational difficulties for the optimization method. The description of the quasi-Newton methods given above uses the formula Bk p = −∇f (xk ) to compute the search direction. This would seem to require the solution of a linear system at a cost of O(n3 ) operations. Some authors recommend using a more sophisticated technique. The Cholesky factorization of the initial matrix B0 = L0 LT0 is computed in the usual way. (If B0 = I , then L0 = I as well, making this especially easy.) At later iterations the update formula is applied to Lk−1 rather than Bk−1 so that at every iteration the Cholesky factorization of Bk is automatically available. In this way, computing the search direction requires only two applications of backsubstitution at a cost of only O(n2 ) operations. This is possible because the update formula is of low rank (for example, the BFGS update is of rank two). Details of this approach can be found in the paper by Gill and Murray (1972).

i

i i

i

i

i

i

12.8. Notes

book 2008/10/23 page 449 i

449

This approach also can be used to ensure that the sufficient descent and gradient-relatedness conditions on the search direction are satisfied. The first developers of quasi-Newton methods used a different set of update formulas. Instead of computing a set of approximations Bk ≈ ∇ 2 f (xk ) they computed Hk ≈ [∇ 2 f (xk )]−1 . For each of the update formulas given above there is a corresponding update formula for Hk . Using these approximations, the search direction is computed from p = −Hk ∇f (xk ) without having to solve a system of linear equations. This makes the algorithms easy to program. However, there is a price associated with this simplicity. If the BFGS formula for Hk is programmed on a computer, then the matrices { Hk } ought to be positive definite. But in rounded computer arithmetic there is a danger that this will not always be true, and this has led people to abandon this approach. If, however, the formula for Bk is used and a factorization of this matrix is updated, then it is possible to monitor the effects of computer arithmetic and ensure that the matrices remain positive definite. (An alternative is to update Hk and monitor the conditions specified in the line search convergence theorem. If these conditions are violated, then the method can be “restarted” by setting Hk = I and using the current value of xk as a new “initial guess” of the solution. Both of these approaches can be used to guarantee global convergence, but both may also interfere with the asymptotic properties of the method and prevent superlinear convergence rates.) An extensive discussion of quasi-Newton methods can be found in the paper of Dennis and Moré (1977). The convergence result that we mention is but one of many results that have been proved for quasi-Newton methods. For further information, see for example the paper by Byrd, Nocedal, and Yuan (1987). Finite Differencing—Further discussion of finite differencing can be found in the books by Dennis and Schnabel (1983, reprinted 1996) and Gill, Murray, and Wright (1981). Special finite-differencing techniques have been derived to approximate sparse Hessian matrices; for details see the papers by Curtis, Powell, and Reid (1974) and Powell and Toint (1979). Finite differencing using complex numbers was first described in the paper by Lyness and Moler (1967); see also the paper by Squire and Trapp (1998). In our discussion we assumed that the rounding errors were proportional to machine precision mach . More generally, the rounding errors will be proportional to the accuracy f with which the function f can be computed, which may be larger than machine precision. In this case, the formulas for h will involve f as well as mach . Automatic Differentiation—A thorough discussion of automatic differentiation can be found in the book by Griewank (2000). Early descriptions of automatic differentiation can be found in the papers by Wengert (1964) and Ostrovskii, Wolin, and Borisov (1971). A number of papers on the topic are contained in the book edited by Griewank and Corliss (1991). We have discussed using automatic differentiation just to compute the gradient. It can also be used effectively for computing the Hessian and for other derivative calculations, such as directional derivatives. (This latter technique can be useful within a truncatedNewton method; see Section 13.3.) Although the number of operations required to calculate the gradient is comparable to the number of operations required to calculate the function, computation of the Hessian is roughly n times as expensive for a function with n variables; this cost is inherent, and not just a deficiency of current techniques.

i

i i

i

i

i

i

450

book 2008/10/23 page 450 i

Chapter 12. Methods for Unconstrained Optimization

Derivative-Free Methods—One of the most widely used derivative-free methods is due to Nelder and Mead (1965). For this particular method the gradient need not go to zero in the limit, although a number of other methods have convergence properties similar to the one described in this section. Many types of derivative-free methods have been developed and studied, including methods suitable for parallel computing, and methods that can solve constrained problems. A survey of such methods can be found in the paper by Kolda, Lewis, and Torczon (2003).

i

i i

i

i

i

i

book 2008/10/23 page 451 i

Chapter 13

Low-Storage Methods for Unconstrained Problems

13.1

Introduction

The methods discussed in this chapter are suitable for solving large problems. They are suitable for two reasons. One is that their storage needs are low ( just a few vectors are needed, unlike the matrix storage needed for the quasi-Newton methods of the last chapter). The other is that the work per iteration (the work required to compute a search direction) is also low, usually proportional to the number of variables n. For quasi-Newton methods the work per iteration is proportional to n2 . The search directions computed by these lowstorage methods are generally of lower quality than those computed by Newton’s method, in the sense that the rate of convergence is slower, and hence more iterations will often be required to find a solution. The hope is that the increase in the number of iterations will be more than compensated by the savings in the costs per iteration—savings that grow ever more dramatic as n increases. Large problems can arise in several ways. In a model designed to optimize the operations of a corporation, adding variables may allow a more detailed examination of the corporate structure—for example, it might allow budget decisions to be examined at the level of individual departments rather than in terms of larger divisions within the company. In an engineering design problem, such as the design of a bridge or an airplane, the number of variables might be proportional to the number of components and so would be large if there were a large number of parts. In optimal control problems the solution is a function that might be approximated by determining its values at a finite number of points; if the solution varied rapidly, a large number of points would be needed to approximate the solution accurately. The chapter begins with a discussion of the linear conjugate-gradient method, a method for solving systems of linear equations. This may seem an odd introduction to this topic, but two of the three groups of methods discussed here adapt the linear conjugate-gradient method to the solution of nonlinear optimization problems. Truncated-Newton methods use the linear conjugate-gradient method to find a search direction. Nonlinear conjugategradient methods generalize its formulas to create a new method. Limited-memory quasiNewton methods are not as easy to categorize. They use the formulas of quasi-Newton 451

i

i i

i

i

i

i

452

book 2008/10/23 page 452 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

methods but are often considered as extensions of nonlinear conjugate-gradient methods. The chapter concludes with a discussion of preconditioning, a powerful tool for accelerating the convergence of these algorithms. In many cases, large problems are also sparse. By exploiting sparsity, it is possible to extend Newton’s method to solve large problems. Although we do not discuss this topic in detail, various approaches to exploiting sparsity are described in the Notes for this chapter and for Appendix A. Of these methods, nonlinear conjugate-gradient methods typically have the lowest per iteration computational costs, followed by limited-memory quasi-Newton methods, truncated-Newton methods, and sparse versions of Newton’s method. Nonlinear conjugategradient methods usually require many iterations to find a solution and may have difficulty in finding a high-accuracy solution to an optimization problem. However, such methods can be successful in finding a low-accuracy solution efficiently. In contrast, Newton’s method is likely to require far fewer iterations and is often able to compute a solution to high accuracy.

13.2 The Conjugate-Gradient Method for Solving Linear Equations The most commonly used technique for solving systems of linear equations is Gaussian elimination. It is referred to as a “direct” method because it determines the solution in a fixed number of arithmetic operations that can be predicted in advance. “Iterative” methods, on the other hand, do not have fixed costs since the solution is obtained from a sequence of approximate solutions, and the algorithm is terminated when some measure of the error has been made adequately small. Iterative methods are a valuable tool for solving large systems of linear equations. They have several potential advantages over direct methods in this case. First, since the coefficient matrix need not be factored, there is no fill-in and loss of sparsity. Second, storage requirements are often lower for iterative methods than for direct methods. In some cases, it may not be necessary to store the coefficient matrix at all. Third, if a good approximation to the coefficient matrix is available, and this approximation can be inverted at low cost, then an iterative method can take advantage of this information to obtain the solution more rapidly. This is not normally possible with a direct method. A great many iterative methods have been invented, but we will only consider one of them: the conjugate-gradient method. (Many of the other iterative methods are applied primarily in the solution of differential equations.) The conjugate-gradient method is designed to solve Ax = b in the case where the matrix A is symmetric and positive definite. It can be considered as a technique for solving the equivalent problem minimize f (x) = 12 x TAx − bTx.

i

i i

i

i

i

i

13.2. The Conjugate-Gradient Method for Solving Linear Equations

book 2008/10/23 page 453 i

453

To see that the problems are equivalent, set the gradient of f to zero: ∇f (x) = Ax − b = 0. This finds the minimum since the Hessian matrix ∇ 2 f (x) = A is positive definite, and the sufficient conditions for a minimum are satisfied. The conjugate-gradient method gets its name from the fact that it generates a set of vectors { pi } that are conjugate with respect to the coefficient matrix A; that is, piTApj = 0

i = j.

if

In the special case where A = I , conjugate vectors are just orthogonal vectors. In general, any set of nonzero conjugate vectors will be linearly independent (see the Exercises). To see the significance of the conjugacy property, assume that the vectors { pi } are known. Consider a trial point y that is a linear combination of m + 1 such vectors y=

m

αi pi

i=0

and evaluate f (y): ⎞  T ⎛ m  m   m  m





1 T αi p i = α i pi A ⎝ αj p j ⎠ − b α i pi f (y) = f 2 i=0 i=0 j =0 i=0

1

αi αj piTApj − αi b T p i 2 i=0 j =0 i=0 m

=

m

m

m m

1 2 T αi pi Api − αi b T p i 2 i=0 i=0  m 

1 2 T T α p Api − αi b pi . = 2 i i i=0

=

(from conjugacy)

It is then easy to minimize the function over all vectors y of this form:   m

αi pi min f (y) = min f { αi }

y

= min { αi }

=

m

i=0

i=0

m 

1 i=0



min αi

2

 αi2 piTApi

− α i b pi T

 1 2 T αi pi Api − αi bTpi . 2

The original problem has been reduced to the sum of one-dimensional minimization problems. Each of these one-dimensional problems can be solved by setting the derivative with respect to αi equal to zero: αi (piTApi ) − bTpi = 0

or

αi =

b T pi . piTApi

i

i i

i

i

i

i

454

book 2008/10/23 page 454 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

(The formula for αi corresponds to an exact line search along the direction pi for the function f ; see the Exercises.) Thus, if we can represent the solution as a linear combination of conjugate vectors, the solution can be found easily. The conjugate-gradient method iteratively determines a set of conjugate vectors { pi } and their coefficients { αi }. Here is one version of the method. The vector ri is equal to the residual b − Axi , and the scalar βi is used to determine the vector pi . Algorithm 13.1. Conjugate-Gradient Method 1. Set x0 = 0, r0 = b = b − Ax0 , p−1 = 0, β0 = 0, and specify the convergence tolerance . 2. For i = 0, 1, . . . (i) (ii) (iii) (iv) (v) (vi)

If ri  < , stop. T If i > 0, set βi = riTri /ri−1 ri−1 . Set pi = ri + βi pi−1 . Set αi = riTri /piTApi . Set xi+1 = xi + αi pi . Set ri+1 = ri − αi Api .

In this algorithm the initial guess is specified as x0 = 0. It may be that a better initial guess is known. In this case the method can still be used, but with r0 = b − Ax0 instead of r0 = b; no other changes are necessary (see the Exercises). The formulas for αi and ri in the conjugate-gradient method are different from the formulas given earlier in this section, but the different formulas can be shown to be equivalent; see the Exercises. One reason for using different formulas is to reduce computational effort. For example, the formula for αi reuses the value riTri from the computation of βi . More importantly, the formula for ri reuses Api from the computation of αi . The matrix A only appears as part of Api , and as long as this matrix-vector product can be computed the algorithm can be used, even if A is not available explicitly. The formation of Api is discussed further below. In this algorithm xi+1 = xi + αi pi , and hence xi+1 = αi pi + αi−1 pi−1 + · · · + α0 p0 so the approximate solutions from the conjugate-gradient method have the same form as the point y used earlier. This shows that xi+1 is in the subspace spanned by {pj }ij =0 . In fact, xi+1 minimizes the quadratic function f (x) = 12 x TAx − bTx over this subspace. It will be shown later in this section that, if exact arithmetic is used, this algorithm produces a set of conjugate vectors { pi } and a set of orthogonal vectors { ri }. Although this algorithm has been written with subscripts on all the variables, only the current values of the variables need be saved. For example, the new value xi+1 can be

i

i i

i

i

i

i

13.2. The Conjugate-Gradient Method for Solving Linear Equations

book 2008/10/23 page 455 i

455

T ri−1 from the previous iteration overwritten on the old one xi . Only the inner product ri−1 need be saved.

Example 13.1 (The Conjugate-Gradient Method). We will apply the conjugate-gradient method to the problem Ax = b with     1 0 0 1 A= 0 2 0 and b = 1 . 0 0 3 1 The method is initialized with     0 1 x0 = 0 , r0 = 1 , 0 1

p−1

  0 = 0 , 0

β0 = 0,

and

 = 10−12 .

At iteration 0, r0  = 1.7321 > , so we do not stop. Then   1 p0 = 1 1 and so α0 = 0.5000,

 x1 =

0.5000 0.5000 0.5000



 ,

and

r1 =

0.5000 0 −0.5000

 .

At iteration 1, r1  = 0.7071 > , so we continue and obtain β1 = 0.1667 and   0.6667 p1 = 0.1667 . −0.3333 This gives α1 = 0.6000,  x2 =

0.9000 0.6000 0.3000



 ,

and

r2 =

0.1000 −0.2000 0.1000

 .

At iteration 2, r2  = 0.2449 > , so we continue, getting β2 = 0.1200 and   0.1800 p2 = −0.1800 . 0.0600 Then α2 = 0.5556, x3 =



1.0000 0.5000 0.3333



 ,

and

−16

r3 = 10

×

0.1388 0.2776 0.1388

 .

(We used 16-digit arithmetic for these calculations.) At iteration 3, r3  = 3.4 × 10−17 < , so we stop.

i

i i

i

i

i

i

456

book 2008/10/23 page 456 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

The conjugate-gradient method does not require the matrix A explicitly. It requires only the computation of matrix-vector products of the form Ap for an arbitrary vector p. If the matrix A were stored explicitly, then of course this matrix-vector product could be computed using the traditional formulas. However, the traditional formulas are not often used. Large problems are often sparse, or have other special structure that makes it possible to compute Ap efficiently. In such cases software can be written to compute Ap that does not use any matrix storage. Example 13.2 (Efficient Matrix-Vector Product). Consider the n × n matrix ⎛4 ⎜1 ⎜ ⎜ A=⎜ ⎜ ⎜ ⎝

1 4 1

⎞ 1 .. . .. .

0

0 ..

.

4 1

1 4 1 1 4

⎟ ⎟ ⎟ ⎟ + wwT, ⎟ ⎟ ⎠

where w is a vector. If all the entries of w are nonzero, then A is a dense matrix. Nevertheless the matrix-vector product y = Ap can be computed efficiently via the following algorithm. Algorithm 13.2. Efficient Matrix-Vector Product 1. For i = 1, 2, . . . , n (i) yi = 4pi (ii) If i > 1, then yi ← yi + pi−1 (iii) If i < n, then yi ← yi + pi+1 2. y ← y + (w Tp)w. The cost of this algorithm is about 6n arithmetic operations, far less than the 2n2 operations of the traditional matrix-vector product. Notice that the matrix A is not stored. With the possible exception of the matrix-vector product, all of the operations in the conjugate-gradient method are standard vector operations (inner product, multiplication of a vector by a scalar, and sums of vectors). High-performance computers often have special hardware that performs these operations rapidly; hence this algorithm is well suited to such computers if the matrix-vector product can be programmed efficiently. The conjugacy and orthogonality properties of the conjugate-gradient method are proved in the theorem below. The proof given here uses only elementary arguments and is based on mathematical induction. Other derivations of the conjugate-gradient method are possible; some can be found in the paper by Hestenes and Stiefel (1952).

i

i i

i

i

i

i

13.2. The Conjugate-Gradient Method for Solving Linear Equations

book 2008/10/23 page 457 i

457

Theorem 13.3. Assume that the vectors { pi } and { ri } are defined by the formulas for the conjugate-gradient method. Then riTrj = 0,

riTpj = 0,

and piTApj = 0

for i > j . That is, the residuals { ri } are orthogonal, the residuals are orthogonal to the directions pj , j < i , and the directions { pi } are conjugate. Proof. The proof is by mathematical induction, with the induction hypothesis consisting of all three of the equations in the statement of the theorem. For i = 0 we need only show that r0Tp−1 = 0 and p0TAp−1 = 0 since no other cases are possible. These results follow immediately because p−1 = 0. Assume now that the three results are true for i; we wish to prove them for i + 1. This will be done in five steps. Each of these steps makes regular use of the formulas for the conjugate-gradient method. T 1. ri+1 rj = 0 for j < i: T rj = (ri − αi Api )Trj = riTrj − αi rjTApi ri+1

= 0 − αi (pj − βj pj −1 )TApi = −αi pjTApi + αi βj pjT−1 Api = 0. Each of the individual terms in the second-to-last line vanishes because of the induction hypothesis. T 2. ri+1 ri = 0: T ri = riTri − αi riTApi = riTri − αi (pi − βi pi−1 )TApi ri+1 T = riTri − αi piTApi + αi βi pi−1 Api

= riTri −

riTri T p Api + 0 = 0. piTApi i

T 3. ri+1 pj = 0 for j < i + 1: T T T pj = ri+1 rj + βj ri+1 pj −1 ri+1

= 0 + βj (ri − αi Api )T pj −1 = βj (riT pj −1 − αi piTApj −1 ) = 0. T Notice that ri+1 rj = 0 because of steps 1 and 2 in this proof. T 4. pi+1 Apj = 0 for j < i: T T Apj = (ri+1 + βi+1 pi )TApj = ri+1 Apj + βi+1 piTApj pi+1 T = ri+1 [αj−1 (rj − rj +1 )] + 0 T T = αj−1 (ri+1 rj − ri+1 rj +1 ) = 0

because of steps 1 and 2.

i

i i

i

i

i

i

458

book 2008/10/23 page 458 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

T Api = 0: 5. pi+1 T pi+1 Api = (ri+1 + βi+1 pi )T[αi−1 (ri − ri+1 )] T T ri + βi+1 piTri − ri+1 ri+1 − βi+1 piTri+1 ) = αi−1 (ri+1 T ri+1 − 0) = αi−1 (0 + βi+1 piTri − ri+1 T ri+1 ] = αi−1 [βi+1 (ri + βi pi−1 )Tri − ri+1 T T ri − ri+1 ri+1 ] = αi−1 [βi+1 riTri + βi+1 βi pi−1 T ri+1 ] = 0. = αi−1 [βi+1 riTri + 0 − ri+1 T ri+1 /riTri . The final line follows from the definition of βi+1 = ri+1

These five steps together show that the induction hypothesis is true for i + 1, and hence this completes the proof. The approximate solution xi minimizes the function f (x) = 12 x TAx − bTx over all linear combinations of vectors of the form xi = c1 b + c2 (Ab) + c3 (A2 b) + · · · + ci (Ai−1 b) (see the Exercises). The set of vectors of this form is called a Krylov subspace. This result can be used to show that, in exact arithmetic, the conjugate-gradient method converges in a finite number of iterations equal to the number of distinct eigenvalues of the matrix A. The number of distinct eigenvalues is, at most, the number of variables. Most iterative methods do not converge in a finite number of iterations. Instead they generate an infinite sequence of approximate solutions that approach the exact solution in the limit. For this reason it may seem odd to consider the conjugate-gradient method as an iterative method. When the number of variables is large, however, it may be too time consuming to use a number of iterations equal to the number of variables. Also, in rounded arithmetic the finite termination property may not be satisfied, and the number of iterations can be much larger than the number of variables. In a truncated-Newton method (see Section 13.3) the matrix-vector products Ap may only be approximated, and this can lead to a loss of conjugacy and orthogonality more pronounced than that caused by rounded arithmetic. For these reasons the conjugate-gradient method is usually treated as an iterative method like any other. When considered as an iterative method, the linear conjugate-gradient method can be shown to converge linearly with √ xi+1 − x∗ A cond(A) − 1 ≤√ . xi − x∗ A cond(A) + 1 The error is measured in the norm defined by y2A ≡ 12 y TAy. If cond(A) = 1, then the rate constant above is zero and the conjugate-gradient method converges in one iteration. If cond(A) = 100, then the rate constant is about 0.82, and if cond(A) = 1,000,000, then the rate constant is about 0.998.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 459 i

459

The conjugate-gradient method is often used with a “preconditioning” matrix, that is, a matrix M ≈ A. The matrix M usually corresponds to a related linear system that is easier to solve. For example, the matrix M might be diagonal and represent a scaling of the variables. If such a matrix is available, then the conjugate-gradient method can be adjusted to take advantage of this additional information, and this can lead to much faster convergence of the method. This is discussed in Section 13.6.

Exercises 2.1. Apply the conjugate-gradient method to the problem Ax = b, where  A=

2 1 0

1 2 1

0 1 2

 and

  1 b= 1 . 1

Verify that the vectors { pi } are conjugate and the vectors { ri } are orthogonal. 2.2. The conjugate-gradient method is applied to the minimization of a function of three variables. Initially r0 = (1, −1, 2)T. At iteration 1, the first two components of r1 are 2 and 2, respectively. What is the direction of search prescribed by the conjugategradient method at the second iteration? 2.3. The conjugate-gradient method was applied to the minimization of a function. At some iteration the following data were given: ri = (5, 3, −1)T and pi = (4, −2, 1)T. Why cannot these data be correct? 2.4. The choice of the starting direction p0 = r0 is important in the conjugate-gradient method. To see this consider the problem      x1 3 2 0 . = 4 0 1 x2 Suppose that x0 = (1, 1)T, and instead of p0 = r0 take p0 = (−1, 0)T. Perform two iterations of the conjugate-gradient method. List all properties of the “regular” method that are not satisfied in these two iterations. 2.5. Prove that the two formulas for αi given in this section are equivalent, i.e., αi =

r T ri b T pi = Ti . T pi Api pi Api

2.6. Show that the conjugate-gradient method can be adjusted to take advantage of some initial guess x0 = 0 by taking r0 = b − Ax0 . Hint: Show that this is equivalent to applying the method to a related linear system with initial guess equal to zero. 2.7. Prove by induction that the vector ri in the conjugate-gradient method is equal to the residual b − Axi . 2.8. Prove that the conjugate-gradient method converges in one iteration if A = κI , where κ is some positive number.

i

i i

i

i

i

i

460

book 2008/10/23 page 460 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

2.9. Prove that if the nonzero vectors { vi } are mutually conjugate with respect to a positive-definite matrix A, then they are also linearly independent. 2.10. In the conjugate-gradient method prove that pi−1 can

be written as a linear combination of the set of vectors b, Ab, A2 b, . . . , Ai−1 b . Also prove that xi minimizes the quadratic function f (x) = 12 x TAx − bTx over all linear combinations of vectors from this set. 2.11. Use the result of the previous problem to prove that, if exact arithmetic is used, the conjugate-gradient method converges in a number of iterations equal to the number of distinct eigenvalues of the matrix A. 2.12. The goal of this problem is to prove that, when the conjugate-gradient method is used to solve Ax = b, the norms of the errors decrease monotonically. (i) Prove that the conjugate directions satisfy piTpj ≥ 0 for all i and j . (ii) Prove that the estimates of the solution satisfy xi  ≥ xi−1  for all i. (Here the 2-norm is used.) (iii) Let x∗ solve Ax = b. Prove that xi − x∗  ≤ xi−1 − x∗  for all i. 2.13. Write a computer program that uses the conjugate-gradient method to minimize an n-dimensional quadratic function minimize f (x) = 12 x TAx − bTx, x

where A is a positive-definite matrix. You may assume that the starting point x0 is the zero vector. Test your algorithm on the quadratic function with data ⎞ ⎞ ⎛ ⎛ 4 4 0 0 1 0 0 ⎜ −8 ⎟ ⎜0 4 0 0 1 0⎟ ⎟ ⎟ ⎜ ⎜ ⎜ 16 ⎟ ⎜0 0 5 0 0 1⎟ A=⎜ ⎟. ⎟ and b = ⎜ ⎜ 1⎟ ⎜1 0 0 5 0 0⎟ ⎠ ⎝ ⎠ ⎝ −2 0 1 0 0 6 0 9 0 0 1 0 0 6 Your program should be written so that it only uses matrix-vector products of the form Ap, instead of explicitly using the matrix A. This means that no matrices are used in the course of the algorithm.

13.3 Truncated-Newton Methods Truncated-Newton methods are used to solve the problem minimize f (x). They are a compromise on Newton’s method, and they compute a search direction by finding an approximate solution to the Newton equations ∇ 2 f (xk )p ≈ −∇f (xk )

i

i i

i

i

i

i

13.3. Truncated-Newton Methods

book 2008/10/23 page 461 i

461

using some iterative method, usually the conjugate-gradient method. Notice that the Newton equations are a linear system of the form Ax = b with A = ∇ 2 f (xk ) and b = −∇f (xk ). The iterative method is stopped (“truncated”) before the exact solution to the Newton equations has been found, giving the method its name. The overall optimization method now consists of nested iterations. There is an outer iteration that corresponds to our general optimization method (see Section 2.4). At each outer iteration we compute a search direction and perform a line search. The computation of the search direction uses an inner iteration corresponding to the iterative method used to solve the Newton equations. (The line search also represents an inner iteration of the optimization method.) This appears to be a minor adjustment to Newton’s method, but it is enough to allow Newton’s method to be extended to solve large problems. The line search only requires the storage of a few vectors: the current point xk , the gradient at xk , the search direction p, plus perhaps trial values of xk + αp together with their corresponding gradients. The conjugategradient method to compute the search direction also only requires the storage of a few vectors. The only possible obstacle to using this approach might be the computation of matrix-vector products of the form Av = ∇ 2 f (xk )v for arbitrary vectors v. Of course, if explicit second-derivative information were available and easy to compute, then these matrix-vector products would be computed in the traditional way. It is possible to approximate the matrix-vector products using values of the gradient in such a way that the Hessian matrix need not be computed or stored. By rearranging the Taylor series ∇f (xk + hv) = ∇f (xk ) + h∇ 2 f (xk )v + O(h2 ), we obtain that ∇ 2 f (xk )v = lim

h→0

∇f (xk + hv) − ∇f (xk ) . h

Hence the matrix-vector product ∇ 2 f (xk )v can be approximated using ∇ 2 f (xk )v ≈

∇f (xk + hv) − ∇f (xk ) h

for some small value of h. (The selection of h is discussed in Section 12.4.1, although in this setting there is an additional complication since the choice of h depends on v as well as x and f .) Since ∇f (xk ) is the right-hand side of the Newton equations and so is already available, this shows that a matrix-vector product can be approximated using one gradient evaluation. It would also be possible to compute the matrix-vector products using automatic differentiation (see Section 12.4.2). With this approach, two additional gradient evaluations are required for each matrix-vector product, instead of just one for finite differencing. Automatic differentiation would typically produce a more accurate result, however. With either of these techniques for computing the matrix-vector products, the implementation of a truncated-Newton method requires only that the function f (x) and the gradient ∇f (x) be calculated. Vector storage is needed for the conjugate-gradient method and for the line search (these can be the same vectors), but no matrix storage. Many other optimization methods designed for solving large problems have the same requirements for

i

i i

i

i

i

i

462

book 2008/10/23 page 462 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

function information and storage, although the exact amount of vector storage may vary slightly from method to method. If the costs of the matrix-vector product are ignored, then each inner iteration of such a truncated-Newton method requires O(n) arithmetic operations, where n is the number of variables. The cost of each outer iteration, however, is variable since it depends on the number of inner iterations performed. If more inner iterations are performed, then we would expect that a “better” search direction would be obtained, in the sense that we would expect the search direction to be a better approximation to the Newton direction. Hence, there is a trade-off between the arithmetic costs of each outer iteration and the quality of each search direction. This trade-off can be made explicit, since there is a relationship between the accuracy with which the Newton equations are solved and the convergence rate of the truncatedNewton method. Let us assume that the iterative method is stopped when the norm of the residual satisfies   2 ∇ f (xk )p + ∇f (xk ) ≤ φk ∇f (xk ) for some tolerance φk ≥ 0. In this test, the index k refers to the outer iteration and corresponds to the current approximation xk to the solution x∗ . This condition involves the term ∇ 2 f (xk )p + ∇f (xk ), which is the residual for the Newton equations, and which measures how close p is to the Newton direction. This residual is compared to ∇f (xk ), the norm of the right-hand side of the Newton equations. This test measures the relative size of the residual. If the objective function f is multiplied by a nonzero constant (if the units used to measure the objective function are changed), this test is unaffected. The rate of convergence of the truncated-Newton method can be directly related to the choice of the tolerances { φk }. If φk = c < 1, then the truncated-Newton method will converge linearly with rate constant c. If φk → 0, then the truncated-Newton method will converge superlinearly. (This is a consequence of Theorem 11.3; see the Exercises.) If φk ≤ ∇f (xk ) , then the truncated-Newton method will converge quadratically. If φk = 0, then Newton’s method is obtained. The more rapid rates of convergence carry a price. The smaller φk is, the more inner iterations will be required to compute a search direction. On the other hand, the higher the rate of convergence, the fewer outer iterations will normally be required to solve the optimization problem. Many implementations of truncated-Newton methods choose { φk } to obtain linear or superlinear rates of convergence. One such implementation is illustrated in the example below.

i

i i

i

i

i

i

13.3. Truncated-Newton Methods

book 2008/10/23 page 463 i

463

Example 13.4 (Truncated-Newton Method). We will demonstrate the usage of a simple truncated-Newton algorithm. The overall algorithm is of the form described in Theorem 11.7, that is, it will use a backtracking line search. (We will use the parameter value μ = 0.1 in the sufficient decrease condition.) The conjugate-gradient method from Section 13.2 will be used to compute the search direction; the search direction p will be accepted when   2 ∇ f (xk )p + ∇f (xk ) ≤ 0.001. ∇f (xk ) In this example, the matrix-vector products will be computed in the traditional way, using the Hessian matrix ∇ 2 f (xk ). We apply the truncated-Newton method to the n-dimensional problem minimize f (x) =

1 (x 10

− e)TD(x − e) + (x Tx − 14 )2 ,

where e = (1

· · · 1 )T

and D is a diagonal matrix with diagonal entries 1, 2, . . . , n. The gradient and Hessian are given by the formulas ∇f (x) = 15 D(x − e) + 4(x Tx − 41 )x ∇ 2 f (x) = 15 D + 4(x Tx − 14 )I + 8xx T. The matrix-vector product in the conjugate-gradient method can be computed using the formula ∇ 2 f (x)v = 15 Dv + 4(x Tx − 41 )v + 8(x Tv)x; this requires only O(n) arithmetic operations instead of the O(n2 ) operations required for a traditional matrix-vector product. We give detailed results for the first iteration for the case n = 4 and summaries of the complete results for n = 4 and n = 100. The initial guess is x0 = ( 1

−1

1

−1 )T ,

and at this point f (x0 ) = 16.462 ∇f (x0 ) = ( 15.0 −15.8 15.0 −16.6 )T ⎛ ⎞ 23.2 −8 8 −8 8 ⎟ ⎜ −8 23.4 −8 ∇ 2 f (x0 ) = ⎝ ⎠. 8 −8 23.6 −8 −8 8 −8 23.8

i

i i

i

i

i

i

464

book 2008/10/23 page 464 i

Chapter 13. Low-Storage Methods for Unconstrained Problems Table 13.1. Truncated-Newton method (n = 4 and n = 100).

k

ls

cg

∇f (xk )

k

ls

cg

∇f (xk )

0 1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8 9

0 2 5 8 11 15 19 23 27

2 × 101 5 × 100 2 × 100 7 × 10−1 5 × 10−1 1 × 10−1 1 × 10−2 2 × 10−4 5 × 10−8

0 1 2 3 4 5 6 7 8 9

1 2 3 4 5 6 7 8 9 10

0 2 5 8 12 16 20 24 28 32

4 × 102 1 × 102 5 × 101 2 × 101 7 × 100 2 × 100 1 × 10−1 4 × 10−4 8 × 10−7 1 × 10−10

For the conjugate-gradient iteration, the norms of the scaled residuals at the first three iterations are 1, 2.6 × 10−2 , 2.8 × 10−4 . The final value is smaller than the tolerance, and the corresponding approximate solution to the Newton equations is accepted as the search direction: p = ( −0.29602

0.34340

−0.28794

0.38588 )T .

In the line search, α=1 f (x0 + αp) = 4.061 f (x0 ) + μαp T∇f (x0 ) = 14.403 so the step length α = 1 is accepted. The new estimate of the solution is x1 = ( 0.70398

−0.65661

0.71206

−0.61412 )T .

This completes the first iteration of the truncated-Newton method. The complete results for n = 4 and n = 100 are given in Table 13.1. The outer iteration number is indicated by k. The costs of the method are given by “ls” (the number of gradient evaluations used in the line search) and “cg” (the number of gradient evaluations used inside the conjugate-gradient method). (The numbers in the table record the cumulative costs. The norm used is the infinity norm.) Note that, even when n = 100, only 2–4 conjugate-gradient iterations are used to compute the search directions for this example. Truncated-Newton methods are a flexible class of methods. They can be implemented in a general way to solve a wide class of optimization problems. They can also be adapted to specific settings. For example, a special-purpose matrix-vector product could be used,

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 465 i

465

or a carefully chosen preconditioning strategy (see Section 13.6). The tolerances { φk } can be adjusted. A special iterative method could be used so that the method would be suitable for a parallel computer. There are many opportunities for a knowledgeable user to enhance the method. Further information can be found in the Notes section.

Exercises 3.1. Verify the results obtained in Example 13.4 for n = 4. 3.2. Apply the truncated-Newton method described in Example 13.4 to the problem minimize f (x) =

n−1

2 (xi − 2xi+1 )2 .

i=1

Use the initial guess x0 = (1, . . . , 1)T. Solve this problem for n = 4 and n = 10. 3.3. How accurate is the approximation ∇ 2 f (xk )v ≈

∇f (xk + hv) − ∇f (xk ) h

for “small” values of h? 3.4. Consider a truncated-Newton method where the inner conjugate-gradient iteration is terminated after one iteration. Prove that the resulting search direction is a multiple of the steepest-descent direction. 3.5. Suppose that the truncated-Newton method from the previous problem is applied to a quadratic function. Prove that using a step length of α = 1 corresponds to an exact line search. 3.6. Suppose that this same truncated-Newton method is applied to a nonlinear function f that has four continuous derivatives. Define F (α) = f (xk ) + αp. Examine the Taylor series of F (α) for α = 1 for the search direction produced by the truncatedNewton method. How many terms vanish? 3.7. Suppose that the truncated-Newton method of Example 13.4 is applied to a strictly convex nonlinear function f that has two continuous derivatives. Prove that the search direction is always a descent direction, regardless of how many inner iterations of the conjugate-gradient method are performed. 3.8. Suppose that the truncated-Newton method of Example 13.4 is applied to a general nonlinear function f , and that finite differencing is used to approximate the required matrix-vector products. What are the vector storage requirements for the method? You can ignore any storage that might be required to evaluate the function f and its gradient. 3.9. Suppose that the inner iteration of a truncated-Newton method uses a set of parameters { φk } satisfying φk → 0. Assume that xk → x∗ and that ∇ 2 f (x∗ ) is positive definite. Use Theorem 11.3 to prove that the truncated-Newton method converges at a superlinear rate.

i

i i

i

i

i

i

466

book 2008/10/23 page 466 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

3.10. Write a program that minimizes an unconstrained function using a truncated-Newton method. Take the basic details of the method and the test functions from Exercise 5.18 in Chapter 11. Use the following approach. (i) Write a program to solve a linear system of equations Ay = b using the conjugate-gradient method. Assume that A is positive definite. See Exercise 2.13 of this chapter. You may find it helpful to denote the search direction in the conjugate-gradient method as v, rather than p, to avoid confusion between the search direction in the inner iteration and the outer iteration. (ii) Modify your program from (i) so that instead of explicitly using the matrix A, it uses only matrix-vector products of the form Av. This means that no matrices are used in the course of the algorithm. (iii) Write a program for minimizing a convex nonlinear function via a truncatedNewton method. Terminate the inner iteration when the norm of the scaled residual is less than 0.1. Do not form the Hessian. The only quantities required are Hessian-vector products of the form ∇ 2 f (x)v, and these may be √ approximated by (∇f (x + hv) − ∇f (x))/ h. Use h = mach , where mach is machine epsilon. Run your program on test functions 1, 2, 4, and 5. (iv) Modify your code to handle nonconvex problem as follows: Exit the inner iteration if v T∇ 2 f (x)v ≤ θ . If this occurs in the first iteration of the inner iteration, set p = −∇f (x). Otherwise, set p to be the solution estimate presently available from the inner iteration. Use θ = 10−6 . Run your program on test function 3.

13.4

Nonlinear Conjugate-Gradient Methods

Nonlinear conjugate-gradient methods adapt the formulas of the linear conjugate-gradient method so that nonlinear problems can be solved. The linear conjugate-gradient method solves the problem minimize f (x) = 12 x TAx − bTx. At each iteration it computes a new conjugate direction pi using the residual ri = b − Axi and the old direction pi−1 . Then it computes a step length α that minimizes f (xi + αpi ) as a function of α. The residual can also be written as ri = b − Axi = −∇f (xi ). If we do this and replace the computation of α by a line search, then the algorithm has the following form. Algorithm 13.3. Nonlinear Conjugate-Gradient Method 1. Set p−1 = 0, β0 = 0, and set the convergence tolerance . 2. For i = 0, 1, . . .

i

i i

i

i

i

i

13.4. Nonlinear Conjugate-Gradient Methods

book 2008/10/23 page 467 i

467

(i) If ∇f (xi ) < , stop. (ii) If i > 0, set βi = ∇f (xi )T∇f (xi )/∇f (xi−1 )T∇f (xi−1 ). (iii) Set pi = −∇f (xi ) + βi pi−1 . (iv) Use a line search to determine xi+1 = xi + αi pi . This algorithm can be applied to general unconstrained problems: minimize f (x). It requires the computation of the gradient ∇f (x), but no second-derivative calculations. Its storage requirements are low—just the three vectors xi , pi , and ∇f (xi ), plus whatever temporary storage is required by the line search. At each iteration the algorithm requires only a small number of operations on vectors, plus the computation of f and ∇f for various values of x. Hence it is suitable for large problems. Example 13.5 (Nonlinear Conjugate-Gradient Method). We apply the above nonlinear conjugate-gradient method to the minimization problem from Example 13.4. As in Example 13.4, we use a backtracking line search with parameter μ = 0.1. We give detailed results for the first two iterations, as well as a summary of the complete results for n = 4. The results for n = 100 are similar. The initial point is x0 = ( 1 −1 1 −1 )T . At this point, f (x0 ) = 16.462 ∇f (x0 ) = ( 15.0 −15.8

15.0

−16.6 )T .

At the first iteration the steepest-descent direction is used: p = −∇f (x0 ) = ( −15.0

15.8

−15.0

16.6 )T .

In the line search, the first few trial values of α are rejected: α=1 f (x0 + αp) = 7.3 × 105 f (x0 ) + μαp T∇f (x0 ) = −81.058 .. . α = 0.0625 f (x0 + αp) = 0.0985 f (x0 ) + μαp T∇f (x0 ) = 10.367 but the step length α = 0.0625 is accepted. The new point is x1 = ( 0.0625

−0.0125

0.0625

0.0375 )T

i

i i

i

i

i

i

468

book 2008/10/23 page 468 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

with f (x1 ) = 0.98506 ∇f (x1 ) = ( −0.24766 At this iteration

−0.39297

−0.62266

−0.80609 )T .

β1 = 1.2851 × 10−3

and the search direction is p = ( 0.22838

0.41327

0.60338

0.82743 )T .

In the line search α=1 f (x1 + αp) = 1.5712 f (x1 ) + μαp T∇f (x1 ) = 0.85889 α = 0.5 f (x1 + αp) = 0.46348 f (x1 ) + μαp T∇f (x1 ) = 0.92197 and the step length α = 0.5 is accepted. The new point is x2 = ( 0.17669

0.19414

0.36419

0.45121 )T .

This concludes the second iteration. The complete results for n = 4 are given in Table 13.2. The iteration number is indicated by k. The costs of the method are given by “ls” (the number of gradient evaluations

Table 13.2. Nonlinear conjugate-gradient method (n = 4). k

ls

∇f (xk )

k

ls

∇f (xk )

0 1 2 3 4 5 6 7 8 9 10 11 12

1 6 8 11 13 16 18 20 23 24 27 29 32

2 × 101 8 × 10−1 2 × 10−1 2 × 10−1 1 × 10−1 6 × 10−2 3 × 10−2 1 × 10−2 1 × 10−3 1 × 10−3 7 × 10−4 5 × 10−4 2 × 10−4

13 14 15 16 17 18 19 20 21 22 23 24

33 35 37 38 41 43 46 48 50 52 54 57

6 × 10−5 5 × 10−5 2 × 10−5 2 × 10−5 8 × 10−6 7 × 10−6 2 × 10−6 9 × 10−7 5 × 10−7 1 × 10−7 1 × 10−7 7 × 10−8

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 469 i

469

used in the line search). The numbers in Table 13.2 record the cumulative costs. The norm used is the infinity norm. Notice that the nonlinear conjugate-gradient method required more iterations to solve this problem than the truncated-Newton method, but that the iterations for the truncatedNewton method required more gradient evaluations. Overall, however, the truncatedNewton method solved the problem more efficiently. This performance is typical for these methods. There are several versions of the nonlinear conjugate-gradient method that differ in the formula for βi . When applied to a quadratic function these versions are equivalent, but they behave differently on general nonlinear functions. The three best known formulas for βi are βi(1) = ∇f (xi )T∇f (xi )/∇f (xi−1 )T∇f (xi−1 ) T βi(2) = yi−1 ∇f (xi )/∇f (xi−1 )T∇f (xi−1 ) T T ∇f (xi )/yi−1 pi−1 , βi(3) = yi−1

where yi−1 = ∇f (xi ) − ∇f (xi−1 ). The first formula for βi is the one used in the algorithm above and is called the “Fletcher–Reeves” formula because of the paper by Fletcher and Reeves (1964) that discussed the method. If this formula is used, then the method is guaranteed to converge under appropriate assumptions. The second formula is known as the “Polak–Ribiére” formula, and the third as the “Hestenes–Stiefel” formula. Computational experiments have suggested that they generally perform better than the Fletcher–Reeves formula, even though examples have been constructed which cause them to display especially poor performance, bordering on failure. All of these methods have low storage requirements: 3–5 vectors of length n. The line search in a nonlinear conjugate-gradient method plays a more critical role than in, say, Newton’s method. The tolerances in the line search may be more stringent or, depending on the formula used to compute βi , an additional condition must be imposed on the step length αi to ensure that the search direction at the next iteration is a descent direction. (See the Exercises.) At one time nonlinear conjugate-gradient methods were the only effective technique for solving large unconstrained optimization problems. There are still circumstances where they are recommended, for example, if storage is severely limited. They are usually less effective than truncated-Newton methods or limited-memory quasi-Newton methods (see Section 13.5), methods whose storage requirements are only slightly greater but which tend to be more reliable and more efficient. The relative merits of these methods are discussed in the paper by Nash and Nocedal (1991).

Exercises 4.1. Verify the results obtained in Example 13.5 for n = 4. 4.2. Apply the nonlinear conjugate-gradient method described in Example 13.5 to minimize f (x) =

n−1

2 (xi − 2xi+1 )2 .

i=1

Use the initial guess x0 = (1, . . . , 1)T. Solve this problem for n = 4 and n = 10.

i

i i

i

i

i

i

470

book 2008/10/23 page 470 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

4.3. Prove that the three formulas for computing βi are all equivalent when f is a quadratic function and the linear conjugate-gradient method is used. 4.4. Examine the three formulas for βi and determine under what conditions it is possible to guarantee that pi is a descent direction. 4.5. Suppose that the nonlinear conjugate-gradient method of Example 13.5 is applied to a general nonlinear function f . What are the vector storage requirements for the method? You can ignore any storage that might be required to evaluate the function f and its gradient. Do the vector storage requirements change if one of the other formulas for βi is used? 4.6. Consider a nonlinear conjugate-gradient method that uses the formula βi(1) . Under what circumstances, if any, will it be possible to guarantee that the conditions of the line search convergence theorem, Theorem 11.7, are satisfied?

13.5

Limited-Memory Quasi-Newton Methods

Limited-memory quasi-Newton methods compromise on quasi-Newton methods in an attempt to achieve some semblance of their performance, but with much lower storage requirements and much lower arithmetic costs per iteration. Limited-memory quasi-Newton methods use the quasi-Newton update formulas to describe an approximation to the inverse of the Hessian matrix, but do not form explicitly the matrix corresponding to this approximation. Instead the formulas are used directly, and only the information required to evaluate the formulas is stored. Because no matrices are stored, the techniques can be applied to problems with large numbers of variables. We will derive these methods from the point of view of quasi-Newton methods. However, in their simplest versions they are similar to nonlinear conjugate-gradient methods, and they share many practical properties with these methods. We begin with a brief review of quasi-Newton methods (see also Section 12.3). Let { xk } be the sequence of approximate solutions to the optimization problem. Then we define sk ≡ xk+1 − xk

and

yk ≡ ∇f (xk+1 ) − ∇f (xk ).

If the BFGS quasi-Newton method is used, the Hessian approximations Bk ≈ ∇ 2 f (xk ) are defined by Bk+1 = Bk −

(Bk sk )(Bk sk )T yk ykT + T skTBk sk yk sk

with (say) B0 = I . At each iteration the search direction for the optimization method is obtained by solving Bk p = −∇f (xk ) and then a line search can be used to determine xk+1 . Every update formula for Bk has a companion formula for updating Hk ≡ Bk−1 . It can be derived using the Sherman–Morrison formula (see Appendix A.9). For the BFGS

i

i i

i

i

i

i

13.5. Limited-Memory Quasi-Newton Methods

book 2008/10/23 page 471 i

471

formula, Hk+1 = Hk −

sk (Hk yk )T + (Hk yk )skT ykTsk

ykTsk + ykTHk yk (sk skT) (ykTsk )2     sk y T yk s T sk s T = I − T k Hk I − T k + T k . yk sk yk sk yk sk +

If the inverse matrices are updated, then the search direction is pk = −Hk ∇f (xk ). Limited-memory quasi-Newton methods are based on these inverse formulas. Assume that yk , sk , and Hk are known. Then pk+1 = −Hk+1 ∇f (xk+1 ) can be computed using the update formula for Hk+1 : pk+1 = −Hk+1 ∇f (xk+1 )     yk s T sk s T sk y T = − I − T k Hk I − T k ∇f (xk+1 ) − T k ∇f (xk+1 ). yk sk yk sk yk sk This final formula requires no matrix storage (other than the storage used to represent Hk ) and uses only vector operations. It is one version of a limited-memory quasi-Newton method. More elaborate formulas can be developed by using additional pairs (yk−1 , sk−1 ), (yk−2 , sk−2 ), (yk−3 , sk−3 ), . . . . Then instead of using a specified Hk , Hk would be defined using the update formula in terms of yk−1 , sk−1 , and Hk−1 . Then Hk−1 could be defined in terms of sk−2 , yk−2 , and Hk−2 . Each succeeding term requires additional vector storage and additional arithmetic to perform the updates. Practical experience has shown that 3–5 updates are appropriate for many problems. If r updates are used to define Hk+1 , then Hk+1−r must be initialized in some manner. A simple approach is to choose Hk+1−r = I ; more sophisticated options are described in the papers cited in the Notes. There is a recursive algorithm that can be used to efficiently compute the search direction using r updates (see the Exercises). Example 13.6 (Limited-Memory Quasi-Newton Method). We apply a limited-memory quasi-Newton method to the minimization problem from Example 13.4. We use a single BFGS update initialized with Hk = I to compute the search direction. As in Example 13.4, we use a backtracking line search with parameter μ = 0.1. We give detailed results for the first two iterations, as well as a summary of the complete results, for n = 4. The results for n = 100 are similar. The first iteration of the limited-memory quasi-Newton method is the same as the first iteration of the nonlinear conjugate-gradient iteration (at the first iteration of both methods,

i

i i

i

i

i

i

472

book 2008/10/23 page 472 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

the steepest-descent direction is used): x0 = ( 1 −1 1 −1 )T f (x0 ) = 16.462 ∇f (x0 ) = ( 15.0 −15.8 15.0 −16.6 )T p0 = ( −15.0 15.8 −15.0 16.6 )T α = 0.0625 x1 = ( 0.0625 −0.0125 0.0625 0.0375 )T f (x1 ) = 0.98506 ∇f (x1 ) = ( −0.24766 −0.39297 −0.62266 −0.80609 )T . At the second iteration s0 = ( −0.93750 0.98750 −0.93750 1.0375 )T y0 = ( −15.248 15.407 −15.623 15.794 )T . For computational purposes, we expand the update formula for p1 in terms of vector operations. It is convenient to use the following intermediate quantities: t0 = y0Ts0 = 60.542 t1 = s0T∇f (x1 ) = −0.40846 t2 = t1 /t0 = −0.0067468. Then we form the vector u: u = ∇f (x1 ) − t2 y0 = ( −0.35053

−0.28902

−0.72806

−0.69954 )T .

In the general case we would then compute u ← H0 u. Here we are using H0 = I so no computation is necessary. We can then compute the search direction p1 via t3 = y0Tu = 1.2176 t4 = t3 /t0 = 0.20112 and finally p1 = −u + (t4 − t2 )s0 = ( 0.32535 0.31554

0.70288

0.72740 )T .

In the line search α=1 f (x1 + αp1 ) = 1.5261 f (x1 ) + μαp1T∇f (x1 ) = 0.86220 α = 0.5 f (x1 + αp1 ) = 0.47636 f (x1 ) + μαp1T∇f (x1 ) = 0.92363

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 473 i

473 Table 13.3. Limited-memory quasi-Newton method (n = 4). k 0 1 2 3 4 5 6 7 8 9 10 11 12

ls

∇f (xk )

k

ls

∇f (xk )

1 6 8 10 11 13 16 18 21 22 24 27 28

2 × 10 8 × 10−1 3 × 10−1 2 × 10−1 9 × 10−2 9 × 10−2 2 × 10−2 6 × 10−3 2 × 10−3 4 × 10−4 3 × 10−4 6 × 10−5 3 × 10−5

13 14 15 16 17 18 19 20 21 22 23 24 25

30 32 34 36 37 39 41 43 45 46 48 50 52

3 × 10−5 9 × 10−6 8 × 10−6 4 × 10−6 3 × 10−6 3 × 10−6 7 × 10−7 6 × 10−7 4 × 10−7 3 × 10−7 3 × 10−7 1 × 10−7 8 × 10−8

1

so the step length α = 0.5 is accepted. The new point is x2 = ( 0.22517

0.14527

0.41394

0.40120 )T .

This concludes the second iteration. The complete results for n = 4 are given in Table 13.3. The iteration number is indicated by k. The number of gradient evaluations used in the line search is given by “ls.” (The numbers in Table 13.3 record the cumulative costs. The norm used is the infinity norm.)

Exercises 5.1. Verify the results obtained in Example 13.6 for n = 4. 5.2. Apply the limited-memory quasi-Newton method in Example 13.6 to minimize f (x) =

n−1

2 (xi − 2xi+1 )2 .

i=1

Use the initial guess x0 = (1, . . . , 1)T. Solve this problem for n = 4 and n = 10. 5.3. Suppose that the limited-memory quasi-Newton method of Example 13.6 is applied to a general nonlinear function f . What are the vector storage requirements for the method? You can ignore any storage that might be required to evaluate the function f and its gradient. 5.4. Use the Sherman–Morrison formula to derive the BFGS update formula for Hk .

i

i i

i

i

i

i

474

book 2008/10/23 page 474 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

5.5. Use the Sherman–Morrison formula to derive the update formula for Hk based on the symmetric rank-one update Bk+1 = Bk +

(yk − Bk sk )(yk − Bk sk )T . (yk − Bk sk )Tsk

5.6. Show how to compute the search direction when two updates are used. That is, Hk−2 = I and the pairs (yk−1 , sk−1 ) and (yk−2 , sk−2 ) are given. What are the formulas when three updates are used? How much additional computation is required for each additional update? 5.7. Suppose that a limited-memory quasi-Newton method based on the BFGS formula is used to minimize a nonlinear function. Prove that the search directions are descent directions if all the pairs (yi , si ) satisfy the condition yiTsi > 0. 5.8. Consider a limited-memory quasi-Newton method based on r BFGS updates, with the formula initialized with Hk+1−r = I . Prove that the following algorithm computes the corresponding search direction pk+1 . Within the algorithm, p¯ records the current estimate of Hk+1 ∇f (xk+1 ). If (k + 1) < r set J = 0, K = k + 1; else set J = k + 1 − r, K = r Set p¯ = ∇f (xk+1 ). For i = (K − 1), . . . , 0 j =i+J ρj = 1/(sjTyj ) γi = ρj sjTp¯ p¯ ← p¯ − γi yj For i = 0, 1, . . . , (K − 1) j =i+J φi = ρj yjTp¯ p¯ ← p¯ + sj (γi − φi ) Set pk+1 = −p. ¯

13.6

Preconditioning

The idea behind preconditioning is to take advantage of auxiliary information about a problem to accelerate the convergence of an algorithm. We discuss this idea in the context of the linear conjugate-gradient method where the technique is well developed, but it is a general idea that can be applied to many algorithms. A preconditioner for the conjugate-gradient method is a positive-definite matrix M. Instead of solving Ax = b we will solve the equivalent problem M −1 Ax = M −1 b. The hope is that this transformed system will be easier to solve than the original.

i

i i

i

i

i

i

13.6. Preconditioning

book 2008/10/23 page 475 i

475

Example 13.7 (Preconditioning). Consider the linear system      x1 1 2000 1000 = b. = Ax = 1 1 2 x2 The coefficient matrix has condition number cond(A) ≈ 1700. If we use the preconditioning matrix   1000 0 , M= 0 1 then we obtain the transformed system      x1 0.001 2 1 −1 M Ax = = M −1 b. = 1 1 2 x2 The transformed matrix has condition number cond(M −1 A) = 3, a considerable improvement over the original matrix. It can be verified that the original and the transformed systems have the same solution x ≈ (−0.3227, 0.6663)T. If the conjugate-gradient method is applied to the transformed system, then, after a change of variables, the formulas for the “preconditioned conjugate-gradient method” are obtained (for details, see the Exercises). Algorithm 13.4. Preconditioned Conjugate-Gradient Method 1. Set x0 = 0, r0 = b, p−1 = 0, β0 = 0, and specify the convergence tolerance . 2. For i = 0, 1, . . . (i) (ii) (iii) (iv) (v) (vi) (vii)

If ri  < , stop. Set zi = M −1 ri . T If i > 0, set βi = riTzi /ri−1 zi−1 . Set pi = zi + βi pi−1 . Set αi = riTzi /piTApi . Set xi+1 = xi + αi pi . Set ri+1 = ri − αi Api .

This algorithm requires one more vector than the original conjugate-gradient method (zi ) as well as the computation zi = M −1 ri . This means that M −1 must be “easy” to compute, or that linear systems of the form Mz = r be “easy” to solve. For example, M might be a diagonal matrix. The matrix M is called the preconditioning matrix. The convergence of the preconditioned algorithm depends on the matrix M −1 A. If M = A, then M −1 A = I and the preconditioned method converges in one iteration, but normally this choice is impractical. We would like M −1 A ≈ I or M ≈ A. More precisely, in exact arithmetic the preconditioned method converges in a number of iterations equal to the number of distinct eigenvalues of the matrix M −1 A. Also, from iteration to iteration the

i

i i

i

i

i

i

476

book 2008/10/23 page 476 i

Chapter 13. Low-Storage Methods for Unconstrained Problems

Table 13.4. Conjugate-gradient iterations.

Preconditioned i

ri 

0 1 2 3 4 5 6 7 8 9

2 × 10 1 × 100 1 × 100 4 × 10−1 3 × 10−2 4 × 10−3 3 × 10−4 1 × 10−5 1 × 10−6 2 × 10−16 0

Unpreconditioned

xi − x∗  −1

4 × 10 4 × 10−1 2 × 10−1 4 × 10−2 3 × 10−3 3 × 10−4 3 × 10−5 2 × 10−6 8 × 10−8 8 × 10−17

i

ri 

xi − x∗ 

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

2 × 10 9 × 10−1 4 × 10−1 2 × 10−1 2 × 10−1 1 × 10−1 9 × 10−2 3 × 10−2 2 × 10−2 5 × 10−3 1 × 10−0 9 × 10−4 4 × 10−4 1 × 10−4 6 × 10−6 7 × 10−18

4 × 10−1 3 × 10−1 2 × 10−1 1 × 10−1 9 × 10−2 5 × 10−2 2 × 10−2 7 × 10−3 3 × 10−3 1 × 10−3 6 × 10−4 2 × 10−4 5 × 10−5 1 × 10−5 7 × 10−7 8 × 10−17

0

method converges linearly with a rate constant that depends on cond(M −1 A). Normally M is chosen to reduce the condition number, or to reduce the number of distinct eigenvalues, or both. Example 13.8 (Preconditioned Conjugate-Gradient Method). Consider the system Ax = b where A is a 15 × 15 diagonal matrix with Ai,i = i and b = (1, . . . , 1)T. We use a diagonal preconditioning matrix M with diagonal entries 1, 2, 3, 4, 5, 6, 7, 1, . . . , 1. Then M −1 A has nine distinct eigenvalues (1, 8, 9, 10, 11, 12, 13, 14, 15). As can be seen from Table 13.4, the preconditioned conjugate-gradient method converges in nine iterations, which is consistent with the theory. If the method is used with M = I (no preconditioning), then the method requires 15 iterations, again as expected. The choice of the preconditioner is sometimes specific to the application. For example, if the linear system Ax = b represents an analysis of variance problem with missing data, then M might correspond to the same problem with complete data, a much easier problem to solve. There are also some general choices available. If A is a sparse matrix, then M might represent a factorization of A where all the fill-in is ignored, called an “incomplete Cholesky” factorization. Just as with the matrix-vector product, it is not necessary to store M explicitly.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 477 i

477

Preconditioning (sometimes called “scaling”) can also be applied to other algorithms. In a limited-memory quasi-Newton method a preconditioning matrix M can be used as the initial approximation to the Hessian. In a truncated-Newton method the inner conjugategradient iteration can be preconditioned. In general, if it is known that the variables in a problem will be of vastly different magnitudes (for example, if x1 is measured in light years and x2 in millimeters), then it may be useful to scale the variables so that they all have approximately the same magnitude (see Section 12.5). The conjugacy and orthogonality properties of the preconditioned conjugate-gradient method are stated in the theorem below, an analog of Theorem 13.3. Theorem 13.9. Assume that the vectors { pi } and { ri } are defined by the formulas for the preconditioned conjugate-gradient method. Then riTM −1 rj = 0,

riTpj = 0,

and piTM 1/2 AM 1/2 pj = 0

for i > j . Proof. See the Exercises.

Exercises 6.1. Verify the results in Example 13.8. 6.2. Repeat Example 13.8, but with varying choices of the preconditioning matrix M. Let M be a diagonal matrix with diagonal entries 1, 2, . . . , j, 1, . . . , 1, where j varies between 1 and 15. How many iterations are required to find the solution? Is this result consistent with the theory? 6.3. Apply the preconditioned conjugate-gradient method to the 10 × 10 linear system Ax = b, where A = D + vv T, D is a diagonal matrix with entries di,i = i, v = (1, . . . , 1)T, and b = (1, . . . , 1)T. Use the preconditioner M = D. How many iterations are required? Is this result consistent with the theory? 6.4. Suppose that the preconditioned conjugate-gradient method is applied to a linear system Ax = b with preconditioner M = A. Prove directly that the method terminates in one iteration. 6.5. The purpose of this problem is to derive the formulas for the preconditioned conjugategradient method. Assume that A and M are both symmetric positive-definite matrices. You may use the fact that a positive-definite matrix M can be written as M 1/2 M 1/2 , where M 1/2 is also symmetric and positive definite. (i) Show that the linear system M −1 Ax = M −1 b is equivalent to Aˆ xˆ = bˆ where Aˆ = M −1/2 AM −1/2 ,

xˆ = M 1/2 x,

bˆ = M −1/2 b.

ˆ (ii) Write out the traditional linear conjugate-gradient method for Aˆ xˆ = b.

i

i i

i

i

i

i

478

book 2008/10/23 page 478 i

Chapter 13. Low-Storage Methods for Unconstrained Problems (iii) Show that your result from (ii) is equivalent to the preconditioned conjugategradient method given above.

6.6. Prove Theorem 13.9. While it is possible to do this by mimicking the proof of Theorem 13.3, the results can be obtained more easily by using the approach described in Exercise 6.5.

13.7

Notes

The Conjugate-Gradient Method—The conjugate-gradient method was first described by Hestenes and Stiefel (1952). This paper contains a wealth of information about the method. In rounded arithmetic, the conjugacy and orthogonality properties of the method are lost. For some problems such as Example 13.1 the loss may be negligible, but it is not hard to find examples where almost complete loss of conjugacy occurs. Some authors do not see this as a serious deficiency, but just treat the conjugate-gradient method as another iterative method that keeps iterating until the residual is small enough (see, for example, the book by Cullum and Willoughby (1985, reprinted 2002)). At the other extreme it is possible to save all the vectors { pi } and { ri } and do additional calculations to guarantee orthogonality and conjugacy. This can be expensive. In between these extremes there is a technique called “selective” orthogonalization that performs the addition calculations only as necessary and monitors the algorithm for loss of orthogonality (see the book by Parlett (1980, reprinted 1998)). The conjugate-gradient method has been generalized to problems where the matrix is symmetric, but not positive definite, as well as to nonsymmetric systems; see, for example, the paper by Saad (1981). Many of these generalizations are based on the Lanczos algorithm, an algorithm developed by Cornelius Lanczos in 1950. The Lanczos algorithm is normally used to find eigenvalues of symmetric matrices but can be shown to be equivalent to the conjugate-gradient method. For more information see the paper by Paige and Saunders (1975). Truncated-Newton Methods—A survey of truncated-Newton methods can be found in the paper by Nash (2000). The convergence theory for truncated-Newton methods is described in the paper by Dembo, Eisenstat, and Steihaug (1982). The rules given here are based on the residual of the Newton equations. Other rules are possible and perhaps even preferable; see the paper by Nash and Sofer (1990). The conjugate-gradient method assumes that the coefficient matrix is positive definite, suggesting that truncated-Newton methods can only be applied to convex problems. This is not true. Truncated-Newton methods can be extended to general problems in much the same way as Newton’s method (see the paper by Nash (1984)), as well as by exploiting the properties of the conjugate-gradient method within a trust-region strategy (see the papers by Steihaug (1983) and Toint (1981)). Software incorporating these ideas is available from Netlib (www.netlib.org). A truncated-Newton algorithm suitable for parallel computers is described in the paper by Nash and Sofer (1991). Software is also available from Netlib and is described in the paper by Nash and Sofer (1992).

i

i i

i

i

i

i

13.7. Notes

book 2008/10/23 page 479 i

479

Nonlinear Conjugate-Gradient Methods— An extensive discussion of nonlinear conjugate-gradient methods can be found in the paper by Nocedal (1992). The convergence of such a method with the Fletcher–Reeves formula was proved in the paper by Al-Baali (1985). It should be noted that these methods may require a different line search from that described in Theorem 11.7, since it may not be possible to guarantee convergence, or even to guarantee that the search direction is a descent direction, unless additional conditions are imposed on the step length α. There have been attempts to produce a hybrid method that performs as well as the Polak–Ribiére formula with the guaranteed convergence of the Fletcher–Reeves formula, but the results have only been partially successful. For further details, see the paper by Gilbert and Nocedal (1992). Implementations of nonlinear conjugate-gradient methods often include “restart” procedures, where βi is set to zero intermittently, and the search direction is thus reset to the steepest-descent direction. This is motivated theoretically by the conjugacy properties of the linear conjugate-gradient method (the method terminates after n iterations in exact arithmetic) as well as the practical observation that these methods can “stall” before finding the solution. One approach, described in the paper by Powell (1977), proposes that the method be restarted if |∇f (xi )T∇f (xi−1 )| > ν ∇f (xi−1 )2 , where ν is some small positive number. For a quadratic function, successive gradients (residuals) will be orthogonal; Powell’s test monitors the deterioration in this property. Limited-Memory Quasi-Newton Methods—Limited-memory quasi-Newton methods were first described in the papers by Perry (1977) and Shanno (1978). More recently developed techniques can be found in the papers by Liu and Nocedal (1989) and Byrd et al. (1995). Another way of adapting quasi-Newton methods for large problems is based on a property called “partial separability.” This assumes that the objective function f (x) can be written as the sum of simpler functions, each depending only on a small number of variables. Many large problems can be expressed in this way. For such functions, the Hessian matrix can be decomposed into smaller submatrices, and the usual quasi-Newton formulas can be used to approximate each of these. For further information on this topic, see the paper by Griewank and Toint (1982). Preconditioning—A general discussion of preconditioning can be found in the book by Chen (2005). Preconditioning within the conjugate-gradient method is hinted at in the paper of Hestenes and Stiefel (1952), although the idea was not fully developed until the paper of Concus, Golub, and O’Leary (1976). The choice of a preconditioner may depend on the particular problem being solved, although there are some general techniques available. If the coefficient matrix is sparse, then an incomplete Cholesky factorization may be used as a preconditioner; see the paper by Meijerink and Van Der Vorst (1977). Automatic preconditioning strategies for the conjugate-gradient method within a truncatedNewton methods are discussed in the paper by Nash (1985). The scaling of limited-memory quasi-Newton methods is discussed in the paper by Gilbert and Lemaréchal (1989).

i

i i

i

i

book 2008/10/23 page 480 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 481 i

Part IV

Nonlinear Optimization

i

i i

i

i

book 2008/10/23 page 482 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 483 i

Chapter 14

Optimality Conditions for Constrained Problems

14.1

Introduction

In this part we study techniques for solving nonlinear optimization problems. We concentrate on problems that can be written in the general form minimize subject to

f (x) gi (x) = 0, i ∈ E gi (x) ≥ 0, i ∈ I.

Here E is an index set for the equality constraints and I is an index set for the inequality constraints. We assume that the objective function f and the constraint functions gi are twice continuously differentiable. In this chapter we study the conditions satisfied by solutions to the constrained optimization problem. We shall focus only on local solutions, for the same reasons as in the unconstrained case. In the case of convex problems, that is, when the feasible region is convex and f is a convex function, any local solution is also a global solution. In the unconstrained case the optimality conditions were derived by using a Taylor series approximation to examine the behavior of the objective function f about a local minimizer x∗ . In particular, at points “near” x∗ the value of f does not decrease. A similar approach is used in the constrained case. Taylor series approximations are used to analyze the behavior of the objective f and the constraints gi about a local constrained minimizer x∗ . In this case, at feasible points “near” x∗ the value of f does not decrease. The optimality conditions will be derived in stages, first for problems with linear constraints, and then for problems with nonlinear constraints. The intuition in both cases is similar, but is easier to comprehend when the constraints are linear. In the nonlinear case the details are more complicated and can disguise the basic ideas involved. If all the constraints are linear, feasible movements are completely characterized by feasible directions. (See Section 3.1.) At a local minimizer there can be no feasible directions of descent for f , hence p T∇f (x∗ ) ≥ 0

for all feasible directions p at x∗ .

(14.1)

The first-order optimality condition is a direct result of this statement. 483

i

i i

i

i

i

i

484

book 2008/10/23 page 484 i

Chapter 14. Optimality Conditions for Constrained Problems

If the problem has nonlinear constraints, it may no longer be possible to move to nearby points along feasible directions. Instead, movements will be made along feasible curves. Analyzing movement along curves is more complicated than along directions, and more complicated situations can arise. Even so, the basic idea is that the objective value will not decrease at feasible points near x∗ . Some new concepts arise in the constrained case, in particular, the Lagrange multipliers and the Lagrangian function. The Lagrange multipliers are analogous to the dual variables in linear optimization. The Lagrangian is a single function that combines the objective and constraint functions; it plays a central role in the theory and algorithms of constrained optimization. We shall also develop a theory of duality, a generalization of the duality theory for linear optimization.

14.2

Optimality Conditions for Linear Equality Constraints

In this section we discuss the optimality conditions for nonlinear problems where all constraints are linear equalities: minimize f (x) subject to Ax = b, where A is an m × n matrix. We assume that f is twice continuously differentiable over the feasible region. We also assume that the rows of A are linearly independent, that is, A has full row rank. This is not an unduly restrictive assumption since in theory, if a problem is consistent, we can discard any redundant constraints. The main idea is to transform this constrained problem into an equivalent unconstrained problem. The theory and methods for unconstrained optimization can then be applied to the new problem. To demonstrate the approach consider the problem minimize subject to

f (x) = x12 − 2x1 + x22 − x32 + 4x3 x1 − x2 + 2x3 = 2.

At any feasible point, the variable x1 can be expressed in terms of x2 and x3 using x1 = 2 + x2 −2x3 . Substituting this into the formula for f (x), we obtain the equivalent unconstrained problem minimize 2x22 + 3x32 − 4x2 x3 + 2x2 . (The number of variables has been reduced from three to two.) It is easy to verify that a strict local minimizer to the unconstrained problem is x2 = −1.5, x3 = −1. The solution to the original problem is x∗ = (2.5, −1.5, −1)T with an optimal objective value of f (x∗ ) = −1.5. Any problem with linear equality constraints Ax = b can be recast as an equivalent unconstrained problem. Suppose we have a feasible point x, ¯ that is, Ax¯ = b. Then any other feasible point can be expressed as x = x¯ + p, where p is a feasible direction. Any feasible direction must lie in the null space of A, the set of vectors p satisfying Ap = 0. Denoting this null space by N (A), the feasible region can be described by { x : x = x¯ + p, p ∈ N (A) }. Let Z be an n × r null-space matrix for A (with r ≥ n − m). Then the feasible region is

i

i i

i

i

i

i

14.2. Optimality Conditions for Linear Equality Constraints

book 2008/10/23 page 485 i

485

given by { x : x = x¯ + Zv, where v ∈ r }. Consequently, our constrained problem in x is equivalent to the unconstrained problem minimize φ(v) = f (x¯ + Zv). r v∈

The function φ is the restriction of f onto the feasible region; we shall refer to it as the reduced function. If Z is a basis matrix for the null space of A, then φ will be a function of n − m variables. Not only has the constrained problem been transformed into an unconstrained problem, but also the number of variables has been reduced as well. Example 14.1 (Reduced Function). Consider again the problem minimize

f (x) = x12 − 2x1 + x22 − x32 + 4x3

subject to

x1 − x2 + 2x3 = 2.

Select

 Z=

1 1 0

−2 0 1



as a null-space matrix for the constraint matrix A = (1, −1, 2). Using the (arbitrary) feasible point x¯ = (2, 0, 0)T, any feasible point can be written as    2 1 x = x¯ + Zv = 0 + 1 0 0

−2 0 1

 v

for some v = (v1 , v2 )T. Substituting into f , we obtain the reduced function φ(v) = 2v12 + 3v22 − 4v1 v2 + 2v1 . This is the same reduced function as before, except that now the variables are called v1 and v2 rather than x2 and x3 . The optimality conditions involve the derivatives of the reduced function. If x = x¯ + Zv, then by the chain rule (see Appendix B.7), ∇φ(v) = Z T∇f (x¯ + Zv) = Z T∇f (x) and ∇ 2 φ(v) = Z T∇ 2 f (x¯ + Zv)Z = Z T∇ 2 f (x)Z. (See the Exercises.) The vector ∇φ(v) = Z T∇f (x) is called the reduced gradient of f at x. If Z is an orthogonal projection matrix, it is sometimes called the projected gradient. Similarly the matrix ∇ 2 φ(v) = Z T∇ 2 f (x)Z is called the reduced Hessian matrix, or sometimes the projected Hessian matrix. The reduced gradient and Hessian matrix are the gradient and Hessian of the restriction of f onto the feasible region, evaluated at x. If x∗ is a local solution of the constrained problem, then x∗ = x¯ + Zv∗ for some v∗ , and v∗ is a local minimizer of φ. Hence ∇φ(v∗ ) = 0

and

∇ 2 φ(v∗ ) is positive semidefinite.

i

i i

i

i

i

i

486

book 2008/10/23 page 486 i

Chapter 14. Optimality Conditions for Constrained Problems

Using the formulas for the reduced gradient and Hessian matrix, we obtain the first- and second-order necessary conditions for a local minimizer. They are summarized in the following lemma. Lemma 14.2 (Necessary Conditions, Linear Equality Constraints). If x∗ is a local minimizer of f over { x : Ax = b } and Z is a null-space matrix for A, then •

Z T∇f (x∗ ) = 0,



Z ∇ f (x∗ )Z is positive semidefinite; T

and

2

that is, the reduced gradient is zero and the reduced Hessian matrix is positive semidefinite. A point at which the reduced gradient is zero is a stationary point. Such a point may be a local minimizer of f , or a local maximizer, or neither, in which case it is a saddle point. Second derivative information is used to distinguish local minimizers from other stationary points. The second-order condition is equivalent to the condition v TZ T∇ 2 f (x∗ )Zv ≥ 0

for all v.

Observing that p = Zv is a null-space vector, this can be rewritten as pT∇ 2 f (x∗ )p ≥ 0

for all p ∈ N (A);

that is, the Hessian matrix at x∗ must be positive semidefinite on the null space of A. This condition does not require that the Hessian matrix itself be positive semidefinite. It is a less stringent requirement. If the Hessian matrix at x∗ is positive semidefinite, however, then of course the second-order condition will be satisfied. The second-order sufficiency conditions are also analogous to the unconstrained case. We will assume that Z is a basis matrix for the null space of A, so that the columns of Z are linearly independent. The corresponding second-order sufficiency conditions are given in the lemma below. Results for other null-space matrices are given in the Exercises. Lemma 14.3 (Sufficient Conditions, Linear Equality Constraints). If x∗ satisfies • Ax∗ = b, • Z T∇f (x∗ ) = 0, and • Z T∇ 2 f (x∗ )Z is positive definite, where Z is a basis matrix for the null space of A, then x∗ is a strict local minimizer of f over { x : Ax = b }. The following example illustrates the optimality conditions. Example 14.4 (Necessary Conditions for Optimality). We examine again the problem minimize

f (x) = x12 − 2x1 + x22 − x32 + 4x3

subject to

x1 − x2 + 2x3 = 2.

i

i i

i

i

i

i

14.2. Optimality Conditions for Linear Equality Constraints

book 2008/10/23 page 487 i

487

Since ∇f (x) = (2x1 − 2, 2x2 , −2x3 + 4)T, then at the feasible point x∗ = (2.5, −1.5, −1)T the gradient of f is (3, −3, 6)T. Selecting   1 −2 Z= 1 0 0 1 as the null-space matrix of A = (1, −1, 2), it is easily verified that Z T∇f (x∗ ) = (0, 0)T. Thus, the reduced gradient vanishes at x∗ , and the first-order necessary condition for a local minimum is satisfied at this point. Checking the reduced Hessian matrix, we find that     2  0 0 1 −2 4 −4 1 1 0 T 2 . Z ∇ f (x∗ )Z = 0 2 0 1 0 = −4 6 −2 0 1 0 0 −2 0 1 The reduced Hessian matrix is positive definite at x∗ . Hence the second-order sufficiency conditions are satisfied, and x∗ is a strict local minimizer of f . Notice that ∇ 2 f (x∗ ) itself is not positive definite. Let us choose some other feasible point, say x = (2, 0, 0)T. The reduced gradient at this point is     0 2 T ;

= Z ∇f (x) = 0 0 hence this point is not a local minimizer. To move to a better point we should use a descent direction. Any vector v = (v1 , v2 )T such that v T(Z T∇f (x)) = 2v1 < 0 will be a descent direction for the reduced function at this point. The corresponding direction p = Zv will be a feasible descent direction for f . Let us take another look at the first-order necessary condition. Let x∗ be a local minimum, and let Z be any n × r null-space matrix for A. Breaking ∇f (x∗ ) into its null-space and range-space components gives ∇f (x∗ ) = Zv∗ + ATλ∗ , where v∗ is in r and λ∗ is in m . Premultiplying by Z T and recalling that the reduced gradient vanishes at x∗ , we find that Z TZv∗ = 0. This can occur only if Zv∗ = 0, that is, if the null-space component of the gradient is zero. Therefore, if x∗ is a local minimizer, ∇f (x∗ ) = ATλ∗

(14.2)

for some m-vector λ∗ . Thus, at a local minimum the gradient of the objective is a linear combination of the gradients of the constraints. The vector λ∗ gives the coefficients of this linear combination. It is known as the vector of Lagrange multipliers. Its ith component is the Lagrange multiplier for the ith constraint. The optimality conditions are demonstrated in Figure 14.1. This problem involves a single linear constraint a Tx = b. At the minimizer x∗ the gradient is parallel to the vector a. Therefore there exists some number λ∗ such that ∇f (x∗ ) = aλ∗ . On the other hand, at the point x¯ the gradient is not parallel to the vector a; thus there is no λ that satisfies ∇f (x) ¯ = aλ, and the point is not optimal.

i

i i

i

i

i

i

488

book 2008/10/23 page 488 i

Chapter 14. Optimality Conditions for Constrained Problems

a Tx = b f (x* ) a

x* _ x

_ f (x )

isovalue contours Figure 14.1. Existence of Lagrange multipliers. Example 14.5 (Necessary Conditions for Optimality—Lagrange Multipliers). Consider again the problem in Example 14.1. The first-order necessary condition is     2x1 − 2 1 = −1 λ. 2x2 −2x3 + 4 2 This implies that x1 = 1 + λ/2, x2 = −λ/2, and x3 = 2 − λ. Since the solution must be feasible, we substitute these values into the constraint x1 − x2 + 2x3 = 2 to obtain λ∗ = 3 as the only solution. This indicates that x∗ = (2.5, −1.5, −1)T is the unique stationary point. Since we have seen that the second-order sufficiency conditions are satisfied at x∗ , this is the unique local solution. In Example 14.5 we used condition (14.2) to obtain a local solution. In most cases, however, these equations will not have a closed-form solution. This is demonstrated in Example 14.6. Example 14.6 (Intractability of the Optimality Conditions). Consider the problem minimize subject to

f (x) = x14 x22 + x12 x34 + 12 x12 + x1 x2 + x3 x1 + x2 + x3 = 1.

The first-order necessary condition implies that, at a local minimum,  3 2    4x1 x2 + 2x1 x34 + x1 + x2 1 4 = 1 λ 2x1 x2 + x1 4x12 x33 + 1 1 for some number λ. These three equations together with the constraint x1 + x2 + x3 = 1 give four equations in the four unknowns x1 , x2 , x3 , and λ. These equations are not easy to

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 489 i

489

solve, however. If we try to solve them numerically, there is no guarantee that the solution will be a local minimizer; it may be a saddle point or even a local maximizer. We have shown that if the reduced gradient is zero, then there exists a vector of Lagrange multipliers λ∗ that satisfies the optimality condition (14.2). The reverse is also true; that is, (14.2) implies that the reduced gradient vanishes (see the Exercises). Thus, the two versions of the first-order optimality condition are equivalent. From a practical point of view there is a difference, however. If the reduced gradient at a given point is nonzero, it can be used to find a descent direction for the reduced function, and in turn for f . In contrast, the fact that Lagrange multipliers do not exist at a point does not assist in finding a better estimate of a solution. Then why do we care about Lagrange multipliers? The Lagrange multipliers provide important information in sensitivity analysis (see Section 14.3). Furthermore, for problems with inequality constraints, estimates of the multipliers can indicate how to improve an estimate of the solution. Consequently, the two equivalent optimality conditions are used together in optimization software. A common procedure is to find a point x∗ for which the reduced gradient is zero; at x∗ condition (14.2) is consistent and the corresponding Lagrange multipliers can be computed. Our derivation assumes that the matrix A has full row rank, that is, its rows are linearly independent. This assumption is called a regularity assumption. The results in this section can be extended to the case where the rows of A are linearly dependent, but then the vector of Lagrange multipliers will not generally be unique. For problems with nonlinear constraints, some assumption, such as a regularity assumption on the gradients of the constraints at the local minimum, is needed to state the optimality conditions.

Exercises 2.1. Consider the problem minimize

f (x) = x12 + x12 x32 + 2x1 x2 + x24 + 8x2

subject to

2x1 + 5x2 + x3 = 3.

(i) Determine which of the following points are stationary points: (i) (0, 0, 2)T; (ii) (0, 0, 3)T; (iii) (1, 0, 1)T. (ii) Determine whether each stationary point is a local minimizer, a local maximizer, or a saddle point. 2.2. Determine the minimizers/maximizers of the following functions subject to the given constraints. (i) (ii) (iii) (iv) (v)

f (x1 , x2 ) = x1 x23 subject to 2x1 + 3x2 = 4. f (x1 , x2 ) = 2x1 − 3x2 subject to x12 + x22 = 25. f (x1 , x2 ) = x12 + 2x1 x2 + x22 subject to 3x12 + x22 = 9. f (x1 , x2 ) = 3x13 + 2x23 subject to x12 + x22 = 4. f (x1 , x2 ) = x2 subject to x13 + x23 − 3x1 x2 = 0.

i

i i

i

i

i

i

490

book 2008/10/23 page 490 i

Chapter 14. Optimality Conditions for Constrained Problems (vi) f (x1 , x2 ) = x13 + x23 subject to 2x1 + x2 = 1. (vii) f (x1 , x2 ) = 13 x13 + x2 subject to x12 + x22 = 1.

2.3. Find all the values of the parameters a and b such that (0, 0)T minimizes or maximizes the following function subject to the given constraint: f (x1 , x2 ) = (a + 2)x1 − 2x2

subject to

a(x1 + ex1 ) + b(x2 + ex2 ) = 1.

2.4. Consider the problem of finding the minimum distance from a point r to a set {x : a Tx = b}. The problem can be written as minimize subject to

f (x) = 12 (x − r)T(x − r) a Tx = b.

Prove that the solution is given by x∗ = r +

b − a Tr a. a Ta

2.5. Solve the problem maximize subject to

f (x) = x1 x2 x3 x1 x2 x3 + + =1 a1 a2 a3

(a1 , a2 , a3 > 0).

2.6. Solve the problem f (x) = x1 x2 · · · xn x1 x2 xn subject to + + ··· + = 1 (a1 , a2 , . . . , an > 0). a1 a2 an Let A be a matrix of full row rank. Find the point in the set Ax = b which minimizes f (x) = 12 x Tx. Heron’s problem. The two-dimensional points A and B lie in the same half plane with respect to the line l. If C minimizes the sum of the distances AC and BC, prove that the angle between AC and l is equal to the angle between BC and l. Euclid’s problem. In a given triangle ABC, inscribe a parallelogram ADEF with side DE parallel to AC, and F E parallel to AB. Determine the parallelogram of this form with the largest area. Consider the linear program maximize

2.7. 2.8.

2.9.

2.10.

minimize subject to

f (x) = cTx Ax = b.

Prove that if the problem has a feasible solution, then either the problem is unbounded, or all feasible points are optimal. 2.11. (From Luenberger (2003).) Consider the quadratic program minimize subject to

f (x) = 12 x TQx − cTx Ax = b.

Prove that x∗ is a local minimum point if and only if it is a global minimum point (no convexity is assumed).

i

i i

i

i

i

i

14.3. The Lagrange Multipliers and the Lagrangian Function

book 2008/10/23 page 491 i

491

2.12. Derive the formulas for the reduced gradient and Hessian, that is, ∇φ(v) = Z T∇f (x¯ + Zv) = Z T∇f (x) ∇ 2 φ(v) = Z T∇ 2 f (x¯ + Zv)Z = Z T∇ 2 f (x)Z, where x = x¯ + Zv. 2.13. Prove Lemma 14.3. 2.14. Let Z be a null-space matrix for the matrix A. Prove that if ∇f (x∗ ) = ATλ for some λ, then Z T∇f (x∗ ) = 0. 2.15. Consider the problem of minimizing a twice continuously differentiable function f subject to the linear constraints Ax = b. Let x∗ be a feasible point for the constraints. Let Z be an n × r null-space matrix for A which is not a basis, that is, some of its columns are linearly dependent (and r > n − m). (i) Prove that the matrix Z T∇ 2 f (x∗ )Z cannot be positive definite. (ii) Prove that if Z T∇f (x∗ ) = 0

and

pT∇ 2 f (x∗ )p > 0

for all p ∈ N (A), p = 0,

then x∗ is a strict local minimizer of f over the set Ax = b. This is an alternative form of the second-order sufficiency conditions. 2.16. Consider the problem

f (x) = x12 + x22 x1 + x2 = 2.

minimize subject to 

Let Z=

1 2 − 12

− 12



1 2

be a null-space matrix for the constraint set. Show that the first-order necessary condition is satisfied at the point x∗ = (1, 1)T, but that Z T∇ 2 f (x∗ )Z is not positive definite. Show also that the second-order conditions given in the previous problem are satisfied, and hence x∗ is a strict local minimum point. 2.17. Consider the problem maximize f (x) subject to Ax = b, where f is twice continuously differentiable, and A is a matrix of full row rank. (i) State and prove the first-order necessary condition for a local solution. (ii) State and prove the second-order necessary conditions for a local solution. (iii) State and prove the second-order sufficiency conditions for a local solution.

14.3 The Lagrange Multipliers and the Lagrangian Function The Lagrange multipliers express the gradient at the optimum as a linear combination of the rows of the constraint matrix A. These multipliers have a significance which goes beyond

i

i i

i

i

i

i

492

book 2008/10/23 page 492 i

Chapter 14. Optimality Conditions for Constrained Problems

this purely mathematical interpretation. In this section we shall see that they indicate the sensitivity of the optimal objective value to changes in the data. We also present the Lagrangian function and show how it can be used to express the optimality conditions in a concise way. In most applications, only approximate data are available. Measurement errors, fluctuations in data, and unavailability of information are some of the factors that contribute to imprecision in the optimization model. In the absence of precise data, there may be no choice but to solve the problem using the best available estimates. Once a solution is obtained, the next step is to assess the quality of the resulting solution. A key question is, how sensitive is the solution to variations in the data? Here we address this question for the particular case where small variations are made in the right-hand side of the constraints and investigate their effect on the optimal objective value. Our presentation will be informal. A more formal proof is somewhat more complex. We start with the problem minimize subject to

f (x) Ax = b.

We assume that f is twice continuously differentiable, and that A is an m × n matrix of full row rank. We also assume that a local minimizer x∗ has been found, with corresponding optimal objective value f (x∗ ). Suppose now that the right-hand side b is perturbed to b + δ, where δ is a vector of “small” perturbations. We shall investigate how the optimal objective value changes as a result of these perturbations. If the perturbations are sufficiently small, it is reasonable to assume that the new problem has an optimum that is close to x∗ . In fact this can be shown to be true, provided that the second-order sufficiency conditions are satisfied at x∗ . For x¯ close to x∗ with Ax¯ = b + δ, we can use a Taylor series approximation to obtain f (x) ¯ ≈ f (x∗ ) + (x¯ − x∗ )T∇f (x∗ ) = f (x∗ ) + (x¯ − x∗ )TATλ∗ = f (x∗ ) + δ Tλ∗ m

= f (x∗ ) + δi λ∗i . i=1

In particular, this is valid if x¯ is the minimizer of the perturbed problem. If the righthand side of the ith constraint changes by δi , then the optimal objective value changes by approximately δi λ∗i . Hence λ∗i represents the change in the optimal objective per unit change in the ith right-hand side. For this reason, the Lagrange multipliers are also called shadow prices or dual variables. Example 14.7 (Solution of a Perturbed Problem). Consider again the problem minimize subject to

f (x) = x12 − 2x1 + x22 − x32 + 4x3 x1 − x2 + 2x3 = 2.

In Example 14.5 we determined that x∗ = (2.5, −1.5, −1)T, with f (x∗ ) = −1.5 and λ∗ = 3. Consider now the perturbed problem minimize

f (x) = x12 − 2x1 + x22 − x32 + 4x3

subject to

x1 − x2 + 2x3 = 2 + δ,

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 493 i

493

and denote its minimum value by f∗ (δ). The interpretation of the Lagrange multipliers as shadow prices indicates that a first-order estimate of this minimum value is f∗ (δ) ≈ −1.5 + 3δ. For example, if δ = 0.5, the approximate optimal objective value is zero. The precise solution to the perturbed problem is x1 = 2.5 − δ/2, x2 = −1.5 + δ/2, and x3 = −1 + δ, with an objective value of f∗ (δ) = −1.5 + 3δ − 0.5δ 2 . If δ = 0.5, the true value of the optimal objective is −0.125. Let us now take another look at the optimality conditions (14.2). Since any solution must be feasible, a local optimum is the solution to the system of n + m equations in the n + m unknowns x and λ: ∇f (x) − ATλ = 0 Ax = b. This is another representation of the first-order optimality conditions. These conditions were used by Lagrange, although his work was done in a more general setting (see Section 14.9). Following Lagrange’s approach we can construct a function of x and λ: L(x, λ) = f (x) −

m

λi (aiTx − bi ) = f (x) − λT(Ax − b),

i=1

where aiT denotes the ith row of A. This function is called the Lagrangian function. The gradient of the Lagrangian with respect to x is ∇x L(x, λ) = ∇f (x) − ATλ, and the gradient with respect to λ is ∇λ L(x, λ) = b − Ax. Hence, the first-order optimality conditions can simply be stated as ∇L(x∗ , λ∗ ) = 0. Thus a local minimizer is a stationary point of the Lagrangian function.

Exercises 3.1. Consider the problem minimize

f (x) = 3x12 − 12 x22 − 12 x32 + x1 x2 − x1 x3 + 2x2 x3

subject to

2x1 − x2 + x3 = 2.

Solve this problem. Use the Lagrange multiplier to estimate the minimum value of f under the perturbed constraint 2x1 − x2 + x3 = 2 + δ. Compare the estimated minimum objective value to the actual minimum for δ = 0.25.

i

i i

i

i

i

i

494

book 2008/10/23 page 494 i

Chapter 14. Optimality Conditions for Constrained Problems

3.2. For the previous problem, determine the exact solution to the perturbed problem as a function of δ. Are there any limits on how large δ can be before this result ceases to be valid? 3.3. The following problem demonstrates that if the second-order sufficiency conditions are not satisfied at a local minimum x∗ , the perturbed problem may not have an optimum. Consider the problem minimize

f (x) = x12 − x1 x2 − x1

subject to

x1 − x2 = 1.

Show that f has a constant value zero at all feasible points, and thus that all feasible points are local optima. Show that the second-order sufficiency conditions are not satisfied anywhere. Consider now the problem of minimizing f subject to the perturbed constraint x1 − x2 = 1 + δ. Show that the perturbed problem has no local minimum for any nonzero value of δ. 3.4. In Example 14.5, suppose that the constraint is perturbed to x1 − x2 + (2 + δ)x3 = 2. What is the solution to the perturbed problem? Can this solution be approximated using Lagrange multipliers? Can you approximate the solution to the problem with constraint (1 + δ1 )x1 − (1 + δ2 )x2 + (2 + δ3 )x3 = 2 + δ4 , where all the coefficients are independently perturbed?

14.4

Optimality Conditions for Linear Inequality Constraints

We now turn our attention to problems where the constraints are linear inequalities. We start with an example: minimize f (x) = 12 x12 + 21 x22 subject to x1 + 2x2 ≥ 2 x1 − x2 ≥ −1 −x1 ≥ −3. The objective of this problem is to find the feasible point closest in Euclidean norm to the origin. This is depicted in Figure 14.2. The figure suggests that the solution x∗ is on the line x1 + 2x2 = 2. Let us assume for the moment that this is the case. Then x∗ is a minimizer of f along this line and will solve the equality-constrained problem minimize

f (x) = 12 x12 + 12 x22

subject to

x1 + 2x2 = 2.

The unique solution of the first-order optimality conditions for this problem is x∗ = ( 25 , 45 )T with objective value f (x∗ ) = 25 and Lagrange multiplier λ∗ = 25 . Since the

i

i i

i

i

i

i

14.4. Optimality Conditions for Linear Inequality Constraints

book 2008/10/23 page 495 i

495

4

3

2

1

x* 1

2

3

4

Figure 14.2. Graphical solution.

objective function is strictly convex, this point is the global minimizer of f along the line x1 + 2x2 = 2. To determine if x∗ solves the original inequality-constrained problem, we must verify that the objective value does not decrease as we make a small movement away from x∗ into the interior of the feasible region, where x1 + 2x2 > 2. For small positive values δ, the minimum objective value along x1 + 2x2 = 2 + δ will change by approximately λ∗ δ. If λ∗ were negative, the objective value would decrease, indicating that the point x∗ would not be a local minimizer. In our example λ∗ = 25 , and thus as we move from the boundary into the interior where x1 + 2x2 = 2 + δ, the objective will increase by roughly 25 δ. Thus, the point x∗ has a better objective value than all its neighboring feasible points and consequently is a local minimizer. In this example a graph helped us identify the constraints that are binding at the solution. We then minimized f with all binding constraints treated as equalities. In most problems we cannot determine the optimal active set (the set of binding constraints) so easily. We may need to examine many trial active sets and rule out those that are not optimal. How can we verify whether a guess of the active set is indeed optimal? Suppose, for example, that we erroneously guessed that only the third constraint was active at the solution. This would mean that the solution to the problem also solved the equality constrained problem minimize subject to

f (x) = 12 x12 + 12 x22 −x1 = −3.

This problem has the solution x1 = 3, x2 = 0, with associated multiplier λ = −3. Since λ < 0, moving into the interior of the constraint will yield points with better objective values. Hence (3, 0)T is not a local minimizer. Our example highlights two major points in the treatment of inequality-constrained problems. First, any solution of the problem is also a solution of the equality-constrained problem obtained by requiring that the active constraints at that point be satisfied exactly. Second, the associated Lagrange multipliers at this point cannot be negative; a negative multiplier indicates that the objective can be improved by making a small move into the interior of the corresponding constraint.

i

i i

i

i

i

i

496

book 2008/10/23 page 496 i

Chapter 14. Optimality Conditions for Constrained Problems

We now develop the optimality conditions in a more rigorous manner. We are interested in solving minimize f (x) subject to Ax ≥ b, where A is an m × n matrix whose rows are the vectors aiT. We shall assume that the system has a feasible solution. Let x∗ be a local solution. Since the constraints that are inactive at x∗ have no impact on the local optimality of x∗ , they can be omitted from the discussion. Let Aˆ be the matrix whose rows are the vectors aiT of the active constraints, and let bˆ be the corresponding vector ˆ ∗ = b. ˆ Any other feasible point may be reached of right-hand-side coefficients. Then Ax from x∗ by moving along some feasible direction p. Note that p is a feasible direction at x∗ ˆ ≥ 0. (See Section 3.1.) To simplify matters, we shall make the regularity if and only if Ap assumption that the rows of Aˆ are linearly independent; however, the final results below will hold even without this assumption. Since x∗ is a local solution for the inequality-constrained problem it is also a local solution for the equality-constrained problem minimize f (x) ˆ = b. ˆ subject to Ax ˆ The first-order necessary condition for the equalityLet Z be a null-space matrix for A. constrained problem implies that Z T∇f (x∗ ) = 0

or equivalently

T ∇f (x∗ ) = Aˆ λˆ ∗ ,

where λˆ ∗ is the vector of Lagrange multipliers (if there are t active constraints, then λˆ is of length t). The second-order necessary conditions imply that Z T∇ 2 f (x∗ )Z must be positive semidefinite. We now show that λˆ ∗ ≥ 0. If not, then some component of λˆ ∗ , say λˆ ∗1 , is negative. Let e1 be a t-dimensional vector whose first component is 1 and all other components are ˆ = e1 0. The rows of Aˆ are linearly independent, and so we can find a vector p such that Ap ˆ ≥ 0, p is a feasible direction for the constraints. But (see the Exercises). Since Ap T pT∇f (x∗ ) = pTAˆ λˆ ∗ = e1Tλˆ ∗ = λˆ ∗1 < 0.

Thus p is a feasible direction of descent at x∗ , contradicting the fact that x∗ is a local minimizer. Therefore, at a local solution the vector of multipliers λˆ ∗ must be nonnegative. We can look at the first-order conditions in another way by defining the multiplier of an inactive constraint to be zero. Then we may form an m-vector λ∗ of the multipliers T associated with all the constraints. The conditions ∇f (x∗ ) = Aˆ λˆ ∗ and λˆ ∗ ≥ 0 are now equivalent to the conditions ∇f (x∗ ) = ATλ∗ and λ∗ ≥ 0. (Each column of A corresponding to an inactive constraint is multiplied by a zero Lagrange multiplier.) The requirement that any inactive constraint have a zero Lagrange multiplier can be expressed as λ∗i (aiTx∗ − bi ) = 0,

i = 1, . . . , m.

These are known as the complementary slackness conditions. They state that either a constraint is active (aiTx∗ − bi = 0) or its associated Lagrange multiplier is zero (λ∗i = 0).

i

i i

i

i

i

i

14.4. Optimality Conditions for Linear Inequality Constraints

book 2008/10/23 page 497 i

497

At least one of the two must hold. The situation where exactly one of the two holds—either aiTx∗ − bi = 0 or λ∗i = 0, but not both—is called strict complementarity. In this case, the Lagrange multiplier for an active constraint will be positive (that is, λˆ ∗ > 0). If strict complementarity does not hold, then some active constraint will have a Lagrange multiplier equal to zero. Such a constraint is called degenerate. Degeneracy is an undesirable feature, since it may cause algorithms to progress very slowly, or even to fail. We summarize the first- and second-order necessary conditions in the following lemma. Lemma 14.8 (Necessary Condition, Linear Inequality Constraints). If x∗ is a local minimizer of f over the set { x : Ax ≥ b }, then for some vector λ∗ of Lagrange multipliers, • • • •

∇f (x∗ ) = ATλ∗ , or equivalently, Z T∇f (x∗ ) = 0, λ∗ ≥ 0, λ∗ T(Ax∗ − b) = 0, and Z T∇ 2 f (x∗ )Z is positive semidefinite,

where Z is a null-space matrix for the matrix of active constraints at x∗ . We also develop sufficiency conditions that guarantee that a stationary point of f is indeed a local minimizer. For the sake of clarity, we consider only the case when Z is a ˆ basis matrix for the null space of A. One might anticipate that the sufficiency conditions would require Z T∇ 2 f (x∗ )Z to be positive definite, as is the case for equality-constrained problems. Unfortunately, the situation is not so straightforward, as is demonstrated by the following example. Example 14.9 (Anomaly in the Sufficiency Conditions). Consider the problem minimize subject to

f (x) = x13 + x22 −1 ≤ x1 ≤ 0.

At the point x¯ = (0, 0)T the active set consists of the upper bound constraint on x1 . Writing this constraint as −x1 ≥ 0 we find that Aˆ = (−1, 0) is the matrix of the active constraints. T ¯ = Aˆ λˆ for λˆ = 0, and the first-order necessary Since ∇f (x) ¯ = (0, 0)T, then ∇f (x) condition is satisfied at this point. We now examine the second-order necessary conditions, ˆ Then using Z = (0, 1)T as a basis matrix for the null space of A.    0 0 0 = 2 > 0, ¯ = (0, 1) Z T∇ 2 f (x)Z 1 0 2 and so the reduced Hessian matrix is positive definite at x. ¯ The point x¯ is not optimal, however, since any nearby point of the form (−, 0)T (with  small and positive) has a lower objective value. The culprit in this example is a degenerate constraint, namely an active constraint having Lagrange multiplier equal to zero. If there are no degenerate constraints (if strict complementarity holds), we can extend the second-order sufficiency conditions in a straightforward manner.

i

i i

i

i

i

i

498

book 2008/10/23 page 498 i

Chapter 14. Optimality Conditions for Constrained Problems

Lemma 14.10 (Sufficient Conditions, Linear Inequality Constraints I). If x∗ satisfies • • • • •

Ax∗ ≥ b, ∇f (x∗ ) = ATλ∗ , λ∗ ≥ 0, strict complementarity holds, and Z T∇ 2 f (x∗ )Z is positive definite,

then x∗ is a strict local minimizer for the inequality-constrained problem. Proof. We show that along any feasible direction at x∗ , the function f is increasing. Notice ˆ = b} ˆ defined by the active first that x∗ is a strict local minimizer of f on the set {x : Ax ˆ constraints at x∗ . Therefore, along any direction p such that Ap = 0, the function f is ˆ ≥ 0, where some components of Ap ˆ increasing. Consider now a direction p such that Ap are strictly positive. The direction p points into the interior of the feasible region. Since T ∇f (x∗ ) = ATλ∗ = Aˆ λˆ ∗ , then T p T∇f (x∗ ) = pTAˆ λˆ ∗ > 0,

and p is a direction of ascent. Thus, along any feasible direction at x∗ , the function f is increasing, and therefore x∗ is a strict local minimizer. As we have seen, if the Lagrange multiplier associated with an active constraint is positive, than a small movement into the interior of the constraint will cause an increase in the objective value. If the Lagrange multiplier is zero, however, it is impossible to predict from first-order information whether a small move into the interior of the constraint will cause an increase or a decrease in the objective value. Thus, in the case of a degenerate constraint, more stringent conditions on the Hessian are required to guarantee that a point is a local minimum. We just state the result as a lemma. Lemma 14.11 (Sufficient Conditions, Linear Inequality Constraints II). Let Aˆ + be the submatrix of Aˆ corresponding to the nondegenerate active constraints at x∗ , that is, those constraints whose associated multipliers are positive. Let Z+ be a basis matrix for the null space of Aˆ + . If x∗ satisfies • • • • •

Ax∗ ≥ b, ∇f (x∗ ) = ATλ∗ , λ∗ ≥ 0, λ∗ T(Ax∗ − b) = 0, and T 2 ∇ f (x∗ )Z+ is positive definite, Z+

then x∗ is a strict local minimizer for the inequality-constrained problem. Example 14.12 (Sufficiency Conditions in the Presence of Degenerate Constraints). For the problem in Example 14.9, Aˆ + is an empty matrix. Hence Z+ = I , and   0 0 T 2 . Z+ ∇ f (x)Z ¯ += 0 2

i

i i

i

i

i

i

14.4. Optimality Conditions for Linear Inequality Constraints

book 2008/10/23 page 499 i

499

Since this matrix is not positive definite, the second-order sufficiency conditions are not satisfied at x. ¯ We conclude this section with an example involving a small inequality-constrained problem. Example 14.13 (A Small Inequality-Constrained Problem). Consider the problem f (x) = x13 − x23 − 2x12 − x1 + x2 −x1 − 2x2 ≥ −2 x1 ≥ 0 x2 ≥ 0.

minimize subject to

Let λ = (λ1 , λ2 , λ3 )T be the vector of Lagrange multipliers associated with the three constraints. Then the necessary conditions for a local minimum are −x1 − 2x2 ≥ −2, 

3x12 − 4x1 − 1 −3x22 + 1

λ1 (2 − x1 − 2x2 ) = 0,



 =

−1 −2

λ2 x1 = 0,

x1 ≥ 0, 

x2 ≥ 0,

    1 0 λ1 + λ2 + λ3 , 0 1

λ3 x2 = 0,

λ1 ≥ 0, λ2 ≥ 0, λ3 ≥ 0.

We must consider all possible combinations in the complementary slackness conditions, that is, either a constraint is active, or its Lagrange multiplier is zero. If all three constraints are active, there are no feasible points. If the first two constraints are active and λ3 = 0, then −x1 − 2x2 = −2 x1 = 0 so that



−1 −2



 =

−1 −2

 λ1 +

⇒

  1 λ2 0

x=

⇒

  0 1

= =

λ1 λ2

1 0,

and hence this point is a stationary point, where the second constraint is degenerate. If the first and third constraints are active and λ2 = 0, then −x1 − 2x2 = −2 x2 = 0 so that

⇒

      −1 3 0 λ1 + = λ3 −2 1 1

x=

⇒

  2 0

λ1 λ3

= =

−3 −5,

and hence this point is not optimal.

i

i i

i

i

i 2008/1

page 50

i

i

500

Chapter 14. Optimality Conditions for Constrained Problems If the second and third constraints are active and λ1 = 0, then   0 x1 = 0 ⇒ x = 0 x2 = 0

so that



−1 1



    1 0 λ2 + = λ3 0 1

⇒

λ2 λ3

= −1 = 1,

and hence this point is not optimal. If the first constraint is active and λ2 = λ3 = 0, then x1 = 2 − 2x2 and     −1 12x22 − 16x2 + 3 λ1 . = −2 −3x22 + 1 This leads to two solutions. The first is x2 = 1 which gives x1 = 0, which leads to the first point above. The second is x2 = 0.1852 which in turn gives x1 = 1.6297 and λ1 = −0.4485, and hence this cannot be a solution. If the second constraint is active and λ1 = λ3 = 0, then x1 = 0 and     1 −1 λ2 , = 0 −3x22 + 1 which implies that λ2 = −1 and hence is not optimal. If the third constraint is active and λ1 = 0 and λ2 = 0, then x2 = 0 and     2 0 3x1 − 4x1 − 1 λ3 , = 1 1 which gives two solutions x = (1.5486, 0)T and x = (−0.2153, 0)T. The first has λ3 = 1, and hence it is a stationary point; the second solution is infeasible. Finally, it is easy to see that if no constraints are active, then     2 0 3x1 − 4x1 − 1 , = 0 −3x22 + 1 which gives only infeasible solutions. It remains to verify which stationary points satisfy the second-order necessary conditions, and whether any of those satisfies the sufficiency conditions. This is left as an exercise. Since the feasible region is bounded and the objective is continuous, the problem must have a minimum. This example demonstrates the major difficulty in solving problems with inequality constraints: the combinatorial issue of determining the correct active set. Even for a small problem the number of possibilities may be large. To avoid a prohibitive amount of computation, we must devise methods that do not require the consideration of every active set. In Chapter 15 we discuss active-set methods, in which we usually need only consider a fraction of the possible active sets. Another approach, one that avoids the combinatorial difficulty entirely by moving through the interior of the feasible region, is described in Chapter 16.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 501 i

501

Exercises 4.1. Solve the problem

f (x) = 12 x12 + x22 2x1 + x2 ≥ 2 x1 − x2 ≤ 1 x1 ≥ 0.

minimize subject to

4.2. Solve the problem minimize subject to

f (x) = −x12 + x22 − x1 x2 2x1 − x2 ≥ 2 x1 + x2 ≤ 4 x1 ≥ 0.

4.3. Determine which stationary points in Example 14.13 are local minimizers. 4.4. Consider the linear program minimize

f (x) = cTx

subject to

Ax ≥ b.

(i) Write the first- and second-order necessary conditions for a local solution. (ii) Show that the second-order sufficiency conditions do not hold anywhere, but that any point x∗ satisfying the first-order necessary conditions is a global minimizer. (Hint: Show that there are no feasible directions of descent at x∗ , and that this implies that x∗ is a global minimizer.) 4.5. Consider the quadratic problem minimize subject to

f (x) = 12 x TQx − cTx Ax ≥ b,

where Q is a symmetric matrix. (i) Write the first- and second-order necessary optimality conditions. State all assumptions that you are making. (ii) Is it true that any local minimum to the problem is also a global minimum? 4.6. Let A be an m × n matrix whose rows are linearly independent. Prove that there exists a vector p such that Ap = e1 , where e1 = (1, 0, . . . , 0)T. 4.7. Prove Lemma 14.11. 4.8. (From Avriel (1976, reprinted 2003).) Prove the following result, first proved by Gibbs in 1876. Let x∗ be a solution to the problem minimize

f (x) =

n

fj (xj )

j =1

subject to

n

xj = 1

j =1

xj ≥ 0,

j = 1, . . . , n,

i

i i

i

i

i

i

502

book 2008/10/23 page 502 i

Chapter 14. Optimality Conditions for Constrained Problems where each fj is differentiable. Then there exists a number η such that fj (x∗j ) = η fj (x∗j ) ≥ η

if x∗j > 0 if x∗j = 0.

4.9. (From Avriel (1976, reprinted 2003).) Solve the problem minimize

subject to

f (x) = n

n

cj

x j =1 j

aj xj = 1

j =1





xj ≥ 0,

j = 1, . . . , n,

where aj and cj are positive constants. 4.10. Consider the bound-constrained problem minimize subject to

f (x) l ≤ x ≤ u,

where l and u are vectors of lower and upper bounds, such that l < u. Let x∗ be a local minimizer. Show that if x∗i = li if x∗i = ui if li < x∗i < ui

∂f (x∗ ) ≥ 0, ∂xi ∂f (x∗ ) then ≤ 0, ∂xi ∂f (x∗ ) then = 0. ∂xi then

Note that the Lagrange multipliers can be obtained at no additional cost in a boundconstrained problem. 4.11. Consider the problem maximize f (x) subject to Ax ≥ b, where A is an m × n matrix, b is an m-vector, and f is a twice continuously differentiable function. Assume that the system has a feasible solution. (i) State and prove the first-order necessary conditions for a local solution. (ii) State and prove the second-order necessary conditions for a local solution. (iii) State and prove the second-order sufficient conditions for a local solution. (Assume that strict complementarity holds.)

14.5

Optimality Conditions for Nonlinear Constraints

The optimality conditions for problems with nonlinear constraints are similar in form to those for problems with linear constraints. Their derivation, however, is more complicated,

i

i i

i

i

i

i

14.5. Optimality Conditions for Nonlinear Constraints

book 2008/10/23 page 503 i

503

even though it is based on related principles. The intuition behind both derivations is the same, but in the case of nonlinear constraints different technical tools are required to give substance to this intuition. In addition, nonlinear constraints can give rise to situations that are impossible in the case of linear constraints. The optimality conditions for nonlinearly constrained problems form the basis for algorithms for solving such problems, and so are of great importance. However, not all readers may be interested in studying the derivation of these conditions. For this reason, we state the optimality conditions first, together with some examples. We then discuss the use of these optimality conditions within optimization algorithms. Only then do we present the derivation of the optimality conditions.

14.5.1

Statement of Optimality Conditions

We present the optimality conditions separately for problems with equality and inequality constraints. It is straightforward to combine these results into a more general optimality condition (see the Exercises). The problem with equality constraints is written in the general form minimize subject to

f (x) gi (x) = 0, i = 1, . . . , m.

The problem with inequality constraints is minimize subject to

f (x) gi (x) ≥ 0, i = 1, . . . , m.

We assume that all the functions are twice continuously differentiable. Some additional assumption must be made to ensure the validity of the optimality conditions. We have chosen to assume that a solution x∗ to the optimization problem is a “regular” point. In the case of equality constraints this means that the gradients of the constraints { ∇gi (x∗ ) } are linearly independent. In the case of inequality constraints this means that the gradients of the active constraints at x∗ , { ∇gi (x∗ ) : gi (x∗ ) = 0 }, are linearly independent. Example 14.14 (Regularity). Consider an equality-constrained problem with the two constraints g1 (x) = x12 + x22 + x32 − 3 = 0 g2 (x) = 2x1 − 4x2 + x32 + 1 = 0 at the feasible point x∗ = (1, 1, 1)T. The gradients of the constraints at x∗ are ∇g1 (x∗ ) = ( 2 ∇g2 (x∗ ) = ( 2

2 −4

2 )T 2 )T .

These two gradients are linearly independent, and so x∗ is a regular point. Now consider an inequality-constrained problem with the single constraint g1 (x) = ( 12 x12 + 21 x22 − 1)3 ≥ 0

i

i i

i

i

i

i

504

book 2008/10/23 page 504 i

Chapter 14. Optimality Conditions for Constrained Problems

at the feasible point x∗ = (1, 1)T. The constraint is binding at this point, and its gradient is ∇g1 (x∗ ) = ( 0

0 )T .

Hence x∗ is not a regular point. The optimality conditions are expressed in terms of the Lagrangian function L(x, λ) = f (x) −

m

λi gi (x) = f (x) − λTg(x),

i=1

where λ is a vector of Lagrange multipliers, and g is the vector of constraint functions { gi }. We state these conditions below. They are derived in Section 14.7. Theorem 14.15 (Necessary Conditions, Equality Constraints). Let x∗ be a local minimizer of f subject to the constraints g(x) = 0. Let Z(x∗ ) be a null-space matrix for the Jacobian matrix ∇g(x∗ )T. If x∗ is a regular point of the constraints, then there exists a vector of Lagrange multipliers λ∗ such that • ∇x L(x∗ , λ∗ ) = 0, or equivalently Z(x∗ )T∇f (x∗ ) = 0, 2 • Z(x∗ )T∇xx L(x∗ , λ∗ )Z(x∗ ) is positive semidefinite.

and

Theorem 14.16 (Sufficiency Conditions, Equality Constraints). Let x∗ be a point satisfying g(x∗ ) = 0. Let Z(x∗ ) be a basis for the null space of ∇g(x∗ )T. Suppose there exists a vector λ∗ such that • ∇x L(x∗ , λ∗ ) = 0, • Z(x∗ )

T

and

2 ∇xx L(x∗ , λ∗ )Z(x∗ )

is positive definite.

Then x∗ is a strict local minimizer of f in the set { x : g(x) = 0 }. (If the reduced Hessian is negative definite, then x∗ is a local maximizer of f .) The theorems involve the Jacobian matrix ∇g(x∗ )T, which is the matrix of gradients of the constraint functions (see Appendix B.4). For a system of linear equality constraints Ax = b, the Jacobian would be equal to A, and so the condition Z(x∗ )T∇f (x∗ ) = 0, or equivalently ∇x L(x∗ , λ∗ ) = ∇f (x∗ ) − ∇g(x∗ )λ∗ = 0, is analogous to the condition Z T∇f (x∗ ) = 0,

or equivalently

∇f (x∗ ) = ATλ∗ ,

for linear equality constraints.

i

i i

i

i

i

i

14.5. Optimality Conditions for Nonlinear Constraints

book 2008/10/23 page 505 i

505

The second-order conditions are based on the reduced Hessian 2 L(x∗ , λ∗ )Z(x∗ ). Z(x∗ )T∇xx

These conditions involve the Hessian of the Lagrangian L, while in the case of linear constraints they involve the Hessian of the objective f . The second derivatives of linear constraints are zero, however, and so 2 L(x∗ , λ∗ ) = ∇ 2 f (x∗ ) ∇xx

in this case. Thus, the second-order conditions for linearly constrained problems are a special case of the conditions above. These optimality conditions are illustrated in the following example. Example 14.17 (Optimality Conditions, Equality Constraints). Consider the problem minimize subject to

f (x) = x12 − x22 x12 + 2x22 = 4.

Here we have a single constraint g(x) = x12 + 2x22 − 4 = 0. The Lagrangian function is L(x, λ) = x12 − x22 − λ(x12 + 2x22 − 4). An optimal point must therefore satisfy 2x1 − 2λx1 = 0 −2x2 − 4λx2 = 0, together with the feasibility requirement. The first equation √ has two possible solutions: x1 = 0 and λ = 1. If x1 = 0, then from feasibility x2 = ± 2. In either case, the second equation implies that λ = − 12 . If on the other hand λ = 1, then from the second equation we get x2 = 0, and from feasibility x1 = ±2. There are four possible solutions: √ T 2) , λ = − 12 ; x = (0, √ T x = (0, − 2) , λ = − 12 ; λ = 1; x = (2, 0)T, x = (−2, 0)T, λ = 1. These are all stationary points of f . We can determine which are minimizers by examining the Hessian matrix       2(1 − λ) 0 2 0 2 0 2 . = −λ L(x, λ) = ∇xx 0 −2(1 + 2λ) 0 4 0 −2 √ Consider the solution x = (0, 2)T with Lagrange multiplier λ = − 12 . Since √ ∇g(x) = (2x1 , 4x2 )T = (0, 4 2)T we can choose the null-space matrix Z = Z(x) = (1, 0)T. Taking λ = − 12 we obtain 2 L(x, λ)Z = 3 > 0, Z T∇xx

and hence the reduced Hessian is positive √ definite and the point is a strict local minimizer of f . Similarly, the solution x = (0, − 2)T is also a strict local minimizer.

i

i i

i

i

i

i

506

book 2008/10/23 page 506 i

Chapter 14. Optimality Conditions for Constrained Problems

If we take the solution x = (2, 0)T, λ = 1, then ∇g(x) = (2x1 , 4x2 )T = (4, 0)T, and 2 we can choose the null-space matrix Z = (0, 1)T. The reduced Hessian is Z T∇xx L(x, λ)Z = −6 < 0, and hence the point is a local maximizer of f . A similar conclusion holds for the point x = (−1, 0)T. For this problem, all feasible points are regular points. The next theorem gives the necessary conditions for problems with inequality constraints. These conditions are sometimes called the Karush–Kuhn–Tucker conditions, the KKT conditions, or the Kuhn–Tucker conditions; see Section 14.9. Theorem 14.18 (Necessary Conditions, Inequality Constraints). Let x∗ be a local minimum point of f subject to the constraints g(x) ≥ 0. Let the columns of Z(x∗ ) form a basis for the null space of the Jacobian of the active constraints at x∗ . If x∗ is a regular point for the constraints, then there exists a vector of Lagrange multipliers λ∗ such that • ∇x L(x∗ , λ∗ ) = 0, or equivalently Z(x∗ )T∇f (x∗ ) = 0, • λ∗ ≥ 0, • λ∗ Tg(x∗ ) = 0, and 2 • Z(x∗ )T∇xx L(x∗ , λ∗ )Z(x∗ ) is positive semidefinite. The condition λ∗ Tg(x∗ ) = 0 is the complementary slackness condition. Since the vectors λ∗ and g(x∗ ) are both nonnegative, it implies that λ∗i gi (x∗ ) = 0 for each i. This means that either a constraint is active, or its associated Lagrange multiplier is zero. In particular, any inactive constraint has a Lagrange multiplier of zero. If the multipliers corresponding to the active constraints are all positive, then we have strict complementarity; otherwise, if a Lagrange multiplier corresponding to an active constraint is zero, the constraint is said to be degenerate. The second-order sufficiency conditions for a local minimum point are stated below. Theorem 14.19 (Sufficiency Conditions, Inequality Constraints). Let x∗ be a point satisfying g(x∗ ) ≥ 0. Suppose there exists a vector λ∗ such that • ∇x L(x∗ , λ∗ ) = 0, • λ∗ ≥ 0, • λ∗ Tg(x∗ ) = 0, and 2 L(x∗ , λ∗ )Z+ (x∗ ) is positive definite, • Z+ (x∗ )T∇xx

where Z+ is a basis for the null space of the Jacobian matrix of the nondegenerate constraints (the active constraints with positive Lagrange multipliers) at x∗ . Then x∗ is a strict local minimizer of f in the set { x : g(x) ≥ 0 }. These optimality conditions are illustrated in the following example. Example 14.20 (Optimality Conditions, Inequality Constraints). Consider the problem minimize subject to

f (x) = x1 (x1 + 1)2 + x22 ≥ 1 x12 + x22 ≤ 2.

i

i i

i

i

i

i

14.5. Optimality Conditions for Nonlinear Constraints

book 2008/10/23 page 507 i

507

C

-2

A

-1

2

B

Figure 14.3. Problem with nonlinear inequalities. We shall test whether the points A = (0, 0)T, B = (−1, −1)T, and C = (0, (see Figure 14.3). Rearranging the constraints to the “≥” form we obtain

√ T 2) are optimal

L(x, λ) = x1 − λ1 ((x1 + 1)2 + x22 − 1) + λ2 (x12 + x22 − 2). 

Therefore ∇x L(x, λ) =

1 − 2λ1 (x1 + 1) + 2λ2 x1 − 2λ1 x2 + 2λ2 x2



and 2 ∇xx L(x, λ) =

2(λ2 − λ1 ) 0

0 2(λ2 − λ1 )



 .

At the point A, only the first constraint is active, and hence λ2 = 0. Solving for λ1 we obtain 1 − 2λ1 = 0 ⇒ λ1 = 12 . 0=0 Therefore, this is a candidate for a local minimizer. Taking Z = (0, 1)T as a basis matrix for the null space of the Jacobian matrix (2, 0), we get    0 −1 0 2 = −1, Z T∇xx L(x, λ)Z = (0, 1) 1 0 −1 and hence the reduced Hessian matrix is negative definite, and the sufficiency conditions are not satisfied. This point is not a local maximizer since λ1 > 0 (see Exercise 5.9). At the point B both constraints are active. Solving for the Lagrange multipliers we obtain 1 − 2λ2 = 0 ⇒ λ1 = λ2 = 12 . 2λ1 − 2λ2 = 0 Therefore the point satisfies the first-order necessary condition for optimality. Moving to the sufficiency conditions, we note that the null-space matrix for the Jacobian is empty.

i

i i

i

i

i

i

508

book 2008/10/23 page 508 i

Chapter 14. Optimality Conditions for Constrained Problems

Therefore the sufficiency conditions are trivially satisfied, and the point is a strict local minimizer. √ At the point C = (0, 2)T, only the second constraint is active, and hence λ1 = 0. Solving for λ2 we obtain 1 + 2λ2 (0) = 0 √ 2λ2 2 = 0. This system is inconsistent. Hence the first-order necessary condition is not satisfied and the point is not optimal. As in the linearly constrained case (see Section 14.3), the Lagrange multipliers provide a measure of the sensitivity of the optimal objective value to changes in the constraints. This shows up in the optimality conditions which include the requirement that λ∗ ≥ 0 for the inequality-constrained problem. The magnitude of the multipliers also has meaning, with a large multiplier indicating a constraint more sensitive to changes in its right-hand side. The following example shows that if the regularity condition is not satisfied at a local minimizer, the first-order necessary condition for optimality may not hold. Example 14.21 (Regularity Condition Not Satisfied). Consider the problem minimize subject to

f (x) = 3x1 + 4x2 (x1 + 1)2 + x22 = 1 (x1 − 1)2 + x22 = 1.

The solution to this problem is x∗ = (0, 0)T, which is also the only feasible point. The gradients of the constraints at x∗ are (2, 0)T and (−2, 0)T, and thus are linearly dependent. Setting the gradient of the Lagrangian with respect to x equal to zero yields 3 − 2λ1 + 2λ2 = 0 4 = 0. This is an inconsistent system. Hence there are no multipliers λ1 and λ2 for which the gradient of the Lagrangian is zero, even though the point is optimal.

Exercises 5.1. Consider the constraint g1 (x) = ( 12 x12 + 12 x22 − 1)3 ≥ 0 of Example 14.14. (i) Determine which feasible points are regular points and which are not. (ii) Consider the constraint g(x) ˆ = 12 x12 + 21 x22 − 1 ≥ 0. Show that the constraint g(x) ˆ ≥ 0 is equivalent to the constraint g1 (x) ≥ 0. Show also that every feasible point for g(x) ˆ ≥ 0 is also a regular point of this constraint. Thus regularity is not a result of the geometry of the feasible region, but a result of its algebraic representation.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 509 i

509

5.2. Solve the problem

f (x) = cTx n

xi = 0

minimize subject to

i=1 n

xi2 = 1.

i=1

5.3. Solve the problem minimize

f (x) = x1 + x2

subject to log x1 + 4 log x2 ≥ 1. 5.4. Determine the minimizers/maximizers of the following functions subject to the given constraints. If helpful, graph the feasible set to guess minimizers or maximizers. However, you must verify your guess using the optimality conditions. (i) f (x1 , x2 ) = x2 subject to x12 + x22 ≤ 1, −x1 + x22 ≤ 0, and x1 + x2 ≥ 0. (ii) f (x1 , x2 ) = x12 + 2x22 subject to x13 + x23 ≤ 1 and x12 + x22 ≥ 1. 5.5. Consider the problem

f (x) = cTx

maximize

subject to x TQx ≤ 1, where Q is a positive-definite symmetric matrix. (i) Solve the problem. What is the optimal objective value? (ii) What is the solution when the objective function is to be minimized? 5.6. Let Q be an n × n symmetric matrix. (i) Find all stationary points of the problem maximize

f (x) = x TQx

subject to

x Tx = 1.

(ii) Determine which of the stationary points are global maximizers. (iii) How do your results in part (i) change if the constraint is replaced by x TAx ≤ 1, where A is positive definite? 5.7. Use the optimality conditions to find all local solutions to the problem minimize subject to

f (x) = x1 + x2 (x1 − 1)2 + x22 ≤ 2 (x1 + 1)2 + x22 ≥ 2.

5.8. For the problem in Example 14.20, perturb the right-hand side of the first constraint: (x1 + 1)2 + x22 ≥ 1 + δ. Solve the perturbed problem (assume that δ is “small”). Compare the optimal objective value to the value predicted by λ∗ for the original problem.

i

i i

i

i

i

i

510

book 2008/10/23 page 510 i

Chapter 14. Optimality Conditions for Constrained Problems

5.9. Let x be a local maximizer of f subject to the constraints gi (x) ≥ 0. (i) Use the results of Theorem 14.18 to prove that if x∗ is a regular point for the constraints, then there exists a vector of Lagrange multipliers λ∗ ≤ 0 such that ∇x L(x∗ , λ∗ ) = 0 and λ∗ Tg(x∗ ) = 0. (ii) Let Z(x∗ ) be a basis for the null space of the active constraints at x∗ . Prove 2 that Z(x∗ )T∇xx L(x∗ , λ∗ )Z(x∗ ) must be negative semidefinite. 5.10. Consider the problem minimize subject to

f (x) gi (x) = 0, i = 1, . . . , l gi (x) ≥ 0, i = l + 1, . . . , m.

(i) Derive a definition for a regular point of the constraints for this problem. (ii) State the first- and second-order necessary conditions for optimality. (iii) State the second-order sufficiency conditions for optimality at a feasible point. 5.11. Consider the problem minimize

max fi (x).

1≤i≤m

This problem is called a minimax problem. (i) Formulate the minimax problem as a constrained optimization problem. (ii) Use the optimality conditions for the constrained optimization problem to derive the optimality conditions for the minimax problem.

14.6

Preview of Methods

In the unconstrained case, we derived methods for solving minimize f (x) by applying Newton’s method to the optimality condition ∇f (x) = 0. Convergence was guaranteed by insisting that at each iteration the value of the objective function improve: f (xk+1 ) < f (xk ). Methods for constrained problems can be derived in a similar way, although guaranteeing convergence in the constrained case is more difficult. The goal in this section is to indicate some of the difficulties that arise. The next two chapters will provide considerably more detail. We focus our attention here on the equality-constrained problem minimize subject to

f (x) g(x) = 0.

Here g is a vector of m functions gi .

i

i i

i

i

i

i

14.6. Preview of Methods

book 2008/10/23 page 511 i

511

The Lagrangian function in this case is L(x, λ) = f (x) −

m

λi gi (x) = f (x) − λTg(x).

i=1

The optimality conditions can be expressed as conditions on the derivatives of the Lagrangian: ∇x L(x∗ , λ∗ ) = ∇f (x∗ ) − ∇g(x∗ )λ∗ = 0 ∇λ L(x∗ , λ∗ ) = −g(x∗ ) = 0, where ∇g(x∗ ) is the matrix with columns ∇gi (x∗ ) (i.e., the transpose of the Jacobian matrix at x∗ ). We can summarize these conditions compactly as ∇L(x∗ , λ∗ ) = 0. Thus a local minimizer is a stationary point of the Lagrangian function. One way to determine a solution to the optimization problem would be to apply Newton’s method to the system of nonlinear equations ∇L(x, λ) = 0, where the gradient is taken with respect to both x and λ. In fact, the formulas for many methods can be interpreted as doing this, or some variant of this. The formula for Newton’s method is       xk pk xk+1 = + , λk+1 λk νk where pk and νk are obtained as the solution to the linear system   pk = −∇L(xk , λk ). ∇ 2 L(xk , λk ) νk This linear system has the form      2 ∇xx L(xk , λk ) −∇g(xk ) pk −∇x L(xk , λk ) . = νk g(xk ) −∇g(xk )T 0 As in the unconstrained case, if a method is to converge at a superlinear rate, the search direction for the method must approach the solution of this linear system in the limit as the solution to the optimization problem is approached. This linear system plays a fundamental role in the “local” behavior of the methods, that is, their behavior near the solution. On its own, however, it is inadequate to define a method since its “global” behavior is inadequate. As we saw in Chapter 11, there is no guarantee that convergence to a local minimum will be obtained. The first-order conditions define a stationary point, and this need not be a constrained minimizer. In addition, there is the danger that the iterates could diverge. Some globalization strategy is required to guarantee convergence to a local solution. It might be hoped that techniques from the unconstrained case could be applied directly. For example, we might insist that L(xk+1 , λk+1 ) < L(xk , λk ).

i

i i

i

i

i

i

512

book 2008/10/23 page 512 i

Chapter 14. Optimality Conditions for Constrained Problems

1200 1000 800 600 400 200 0 λ

−200 20

10

0

−10

−20

−20

0

x 20

Figure 14.4. Lagrangian function. This would only be satisfactory if the solution (x∗ , λ∗ ) were a local minimizer of the Lagrangian function with respect to both x and λ. Unfortunately (x∗ , λ∗ ) is in general a saddle point of the Lagrangian—not a minimizer—as the following example shows. Example 14.22 (Stationary Point of the Lagrangian). Consider the one-dimensional problem minimize f (x) = x 2 subject to

x = 1.

The solution to this problem is x∗ = 1, with Lagrange multiplier λ∗ = 2. The Lagrangian function is L(x, λ) = x 2 − λ(x − 1). Since ∇L(x, λ) = (2x − λ, −(x − 1))T, then ∇L(1, 2) = (0, 0)T, and indeed (x∗ , λ∗ ) is a stationary point of the Lagrangian. The Hessian matrix of the Lagrangian is   2 −1 . ∇ 2 L(x∗ , λ∗ ) = −1 0 This is an indefinite matrix. Thus (x∗ , λ∗ ) is a saddle point of the Lagrangian function. This is illustrated in Figure 14.4. We will describe two general approaches that are used to guarantee convergence. The first attempts to ensure that xk is feasible at every iteration. Then convergence can be guaranteed, as in the unconstrained case, by insisting that L(xk+1 , λk+1 ) = f (xk+1 ) < f (xk ) = L(xk , λk ). If only feasible points are considered, then the solution x∗ will be a local minimizer of the Lagrangian. When the constraints are linear it is not difficult to maintain feasibility at every iteration, but when nonlinear constraints are present this idea must be interpreted more freely. This approach is the topic of Chapter 15.

i

i i

i

i

i

i

14.6. Preview of Methods

book 2008/10/23 page 513 i

513

The second approach constructs a new function, related to the Lagrangian, that (ideally) has a minimum at (x∗ , λ∗ ). This new function can be considered as “distorting” the Lagrangian at infeasible points so as to create a minimum at (x∗ , λ∗ ). Unconstrained minimization techniques can then be applied to the new function. This approach can make it easier to guarantee convergence to a local solution, but there is the danger that the local convergence properties of the method can be damaged. The “distortion” of the Lagrangian function can lead to a “distortion” in the Newton equations for the method. Hence the behavior of the method near the solution may be poor unless care is taken. This approach is the topic of Chapter 16. These two general approaches, along with all the possible methods within each approach, lead to many different algorithms for solving constrained optimization problems. It is difficult to identify an ideal method, in part because there is no clear way to determine whether the new point xk+1 is better than the current point xk . The difficulty arises because two criteria are used to compare two successive iterates: the value of the objective function, and the infeasibility in the constraints. If all the iterates are feasible points, then the latter criterion is irrelevant and the objective function can be used to measure progress towards the solution. Without that, it is necessary to balance the two criteria to compare two estimates of the solution, and there is no simple way to do this. One approach is to use auxiliary merit functions as an indirect way to measure progress and guarantee convergence. Consider an optimization problem of the form minimize subject to

f (x) g(x) = 0.

An example of a merit function for this problem is M(x) = f (x) + ρg(x),

ρ > 0.

(Here, the norm could be any of the norms discussed in Appendix A.3.) This merit function reflects the combined decrease of the two criteria involved in minimization: the objective function and the infeasibility. The parameter ρ > 0 specifies the relative importance of one criterion with respect to the other. For example, if ρ is large, then the merit function emphasizes the importance of infeasibility when comparing two different iterates. The best choice of ρ is typically unknown. Practical algorithms usually adjust ρ in the course of solving an optimization problem. It can be difficult to choose an appropriate merit function and, once one is chosen, to determine an appropriate value of the parameter ρ. If the choices are inappropriate, the merit function may reject good choices of xk + αp and even prevent the algorithm from achieving its ideal rate of convergence. That is, a poor choice of merit function might reject the iterates generated by Newton’s method, interfere with the quadratic convergence rate, and result in a method that converges only at a slow linear rate. For these reasons, methods have been developed that replace the merit function with a device called a filter. Filter methods assess iterates by explicitly using the objective function and the infeasibility as separate criteria, without combining them into a single value. The filter keeps track of a set of iterates xk that are the best found so far by the algorithm. Because the iterates are compared using two separate criteria, there may be no “best” iterate. For example, suppose that we have two iterates x1 and x5 , where x1 has an objective value of

i

i i

i

i

i

i

514

book 2008/10/23 page 514 i

Chapter 14. Optimality Conditions for Constrained Problems

5.2 and the norm of the infeasibility is 2.7, and x5 has objective value of 3.1 and infeasibility 8.2. Then x5 is better in terms of objective value but worse in terms of infeasibility. In this case, the filter would keep track of both iterates. Filter methods ameliorate many of the difficulties associated with merit functions, but they require a more complicated approach to assess the successive estimates of the solution. Merit functions, filters, and related techniques are discussed in greater detail in the next two chapters. There is a further difficulty, and that is the difficulty of finding a point that satisfies the constraints. If the constraints are linear, then it is possible to find a feasible point by solving a linear program (see Section 5.5). In the nonlinear case, finding a feasible point requires solving a system of nonlinear equations and inequalities, a problem that is as difficult in general as the original optimization problem. Methods have been developed whose purpose is to find a feasible point, but they are not guaranteed to succeed. Although unattractive, it may be necessary to try a method repeatedly with varying starting points to obtain a feasible point. Nonlinear constraints can define complicated feasible regions. A constraint might define a single point (x1 − 5)2 + (x2 − 3)2 = 0, a curve of points (x1 − 5)2 + (x2 − 3)2 = 1, a discrete set of points sin(π x1 ) = 0, or no points x12 + 1 = 0. Small changes in the coefficients in a nonlinear constraint can lead to qualitative differences in the shape of the feasible region. This further exacerbates the difficulty of solving nonlinear optimization problems.13

Exercises 6.1. Consider the equality-constrained problem minimize subject to

f (x) g(x) = 0.

Let (x∗ , λ∗ ) be the optimal solution vector and the associated Lagrange multipliers. Assume that the regularity conditions and the second-order sufficiency conditions hold at x∗ . Prove that L(x∗ , λ∗ ) is a minimizer of L(x, λ) in the direction (p T, ν T)T, when p is a vector in the null space of ∇g(x∗ ) and ν = 0. Prove also that L(x∗ , λ∗ ) is a maximizer of L(x, λ) in the direction (p T, ν T)T, when p = 0 and ν is in the range space of ∇g(x∗ )T. Hence (x∗ , λ∗ ) is a saddle point of the Lagrangian. 13 It

is possible to omit reading the rest of this chapter without loss of continuity.

i

i i

i

i

i

i

14.7. Derivation of Optimality Conditions for Nonlinear Constraints

book 2008/10/23 page 515 i

515

Figure 14.5. No feasible directions.

14.7

Derivation of Optimality Conditions for Nonlinear Constraints

We now examine the derivation of the optimality conditions for problems with nonlinear constraints. We again begin with a problem that has equality constraints only: minimize subject to

f (x) gi (x) = 0, i = 1, . . . , m.

Each of the functions f and gi is assumed to be twice continuously differentiable. If we define g(x) as the vector of constraint functions { gi (x) }, then the problem is to minimize f (x) subject to g(x) = 0. The set of points x such that g(x) = 0 is called a surface. We derive first- and second-order optimality conditions for this problem. The main difficulty is the characterization of small movements that maintain feasibility. In the linear case, such movements can be completely represented in terms of feasible directions (see Chapter 3). In the nonlinear case, this may not be possible. For example, consider the nonlinear equality constraint x12 + x22 = 2, and let x be any feasible point, say x = (1, 1)T. Any small step taken from x along any direction will result in the loss of feasibility (see Figure 14.5). Thus there are no feasible directions at this point, or at any other feasible point. To define small movements that maintain feasibility, we will use feasible curves. A curve is a set of points { x = x(t) : t0 ≤ t ≤ t1 }. It is termed a feasible curve with respect to the surface g(x) = 0 if g(x(t)) = 0 for all such t. A curve passing through the point x∗ satisfies x(t∗ ) = x∗ for some t0 ≤ t∗ ≤ t1 (by a shift of the parameter t we can always assume that t∗ = 0).14 The first derivative of x(t) is the vector x (t) = d(x(t))/dt; this is the tangent to the curve at x(t). The second derivative is the vector x (t) = d 2 (x(t))/dt 2 . In the following discussion we shall consider only curves that have two continuous derivatives. 14 In

this section, we assume that any feasible curve x(t) through x∗ satisfies x(0) = x∗ .

i

i i

i

i

i

i

516

book 2008/10/23 page 516 i

Chapter 14. Optimality Conditions for Constrained Problems x (ε)

x’ (0) x*

Figure 14.6. Feasible curve. Example 14.23 (Feasible Curve). Consider the constraint g(x) = x12 + x22 + x32 − 3 = 0, and consider the curve √  √2 cos(t + π/4) x(t) = 2 sin(t + π/4) , −π ≤ t ≤ π. 1 Then x(0) = (1, 1, 1)T and g(x(t)) = 2 cos2 (t + π/4) + 2 sin2 (t + π/4) + 1 − 3 = 0. Hence x(t) is a feasible curve passing through the point (1, 1, 1)T. The tangent to the curve at (1, 1, 1)T is (see also Figure 14.6)  √     −√ 2 sin(t + π/4) −1  d  = x (0) = x(t) = 1 . 2 cos(t + π/4) dt t=0 0 0 t=0 Suppose that x∗ is a local solution of the optimization problem. Then x∗ is a local minimizer of f along any feasible curve passing through x∗ . Let x(t) be any such curve with x(0) = x∗ . Then t = 0 is a local minimizer of the one-dimensional function f (x(t)), and the derivative of f (x(t)) with respect to t must vanish at t = 0. Using the chain rule we obtain     d f (x(t)) = x (t)T∇f (x(t)) = x (0)T∇f (x∗ ) = 0. dt t=0 t=0 Thus, if x∗ is a local minimizer of f , then x (0)T∇f (x∗ ) = 0

for all feasible curves x(t) through x∗ .

(14.3)

Define

T (x∗ ) = p : p = x (0) for some feasible curve x(t) through x∗ . This is the set of all tangents to feasible curves through x∗ . Assume for convenience that 0 ∈ T (x∗ ). The set has the property that if p ∈ T (x∗ ), then αp ∈ T (x∗ ) for any nonnegative scalar α (see the Exercises). A set with this property is called a cone, and for this reason

i

i i

i

i

i

i

14.7. Derivation of Optimality Conditions for Nonlinear Constraints

x (ε)

book 2008/10/23 page 517 i

517

x’ (0) x*

T ( x* )

Figure 14.7. Tangent cone. T (x∗ ) is sometimes called the tangent cone at x∗ . The tangent cone at the point (1, 1, 1)T in Example 14.23 is shown in Figure 14.7. It is parallel to the tangent plane at (1, 1, 1)T but passes through the origin. From equation (14.3) we obtain a condition for optimality of a feasible point x∗ : pT∇f (x∗ ) = 0

for all p ∈ T (x∗ ).

In this form, the optimality condition is not yet practical, since it is not always easy to represent the set of all feasible curves explicitly. We shall develop an alternative characterization of the tangent cone. To this end, we notice that gi (x(t)) is a constant function of t (it is zero for all t), and hence its derivative with respect to t vanishes everywhere, i.e., d g (x(t)) = 0. Using the chain rule we obtain dt i x (t)T∇gi (x(t)) = 0. In particular, at t = 0 we obtain x (0)T∇gi (x∗ ) = 0. Since this is true for all feasible arcs through x∗ , we obtain pT∇gi (x∗ ) = 0 for all p ∈ T (x∗ ). The equation above holds for each constraint i. It will be useful to define A(x∗ ) as the m × n matrix whose ith row is ∇gi (x∗ )T. This is the Jacobian matrix of g at x∗ . The equation above can be written as A(x∗ )p = 0, so that any vector in the tangent cone at x∗ also lies in the null space of the Jacobian matrix at x∗ : p ∈ T (x∗ ) ⇒ p ∈ N (A(x∗ )). Hence the tangent cone at a point is contained in the null space of the Jacobian matrix at the point. Example 14.24 (Null Space of the Jacobian). Consider the problem in Example 14.23. At x∗ = (1, 1, 1)T we have ∇g(x∗ )T = (2, 2, 2)T. Thus any vector p in the tangent cone must satisfy pT∇g(x∗ ) = 2p1 + 2p2 + 2p3 = 0, that is, p1 + p2 + p3 = 0. In this example, the tangent cone and the null space of the Jacobian are both equal to the set { p : p1 + p2 + p3 = 0 }.

i

i i

i

i

i

i

518

book 2008/10/23 page 518 i

Chapter 14. Optimality Conditions for Constrained Problems

In the previous example, the tangent cone and the null space of the Jacobian were equal. It can be difficult to characterize the tangent cone, but it is easy to compute the Jacobian matrix and generate its associated null space. Hence it would be useful if these two sets were always equal. Unfortunately, this is not always the case, as the next example shows. Example 14.25 (T (x∗ ) = N (A(x∗ ))). Consider the constraint g(x) = ( 12 x12 + 12 x22 −1)2 = √ 0. The feasible set is a circle of radius 2. The tangent cone at the point x∗ = (1, 1)T is the set T (x∗ ) = { p : p1 + p2 = 0 }. Since ∇g(x) = (2( 12 x12 + 12 x22 − 1)x1 , 2( 12 x12 + 12 x22 − 1)x2 )T, the Jacobian matrix at x∗ is A(x∗ ) = (0, 0). Therefore the null space of the Jacobian is N (A(x∗ )) = 2 , and T (x∗ ) = N (A(x∗ )). Luckily, examples such as the above are uncommon. In the majority of problems the tangent cone at a feasible point is indeed equal to the null space of the Jacobian matrix at the point. One condition that guarantees this is regularity, that is, the assumption that the gradient vectors ∇gi (x∗ ), i = 1, . . . , m, are linearly independent (or equivalently, that their Jacobian matrix has full row rank). In the next lemma we prove that if x∗ is a regular point, then T (x∗ ) = N (A(x∗ )). Lemma 14.26. If x∗ is a regular point of the constraints, then T (x∗ ) = N (A(x∗ )). Proof. We need only show that p ∈ N (A(x∗ )) implies that p ∈ T (x∗ ); that is, there exists some feasible curve x(t) through x∗ satisfying x (0) = p. To prove the existence of a feasible curve we shall use the implicit function theorem (see Appendix B.9). Let y be an m-dimensional vector, and consider the following system of nonlinear equations in y and t: g(x∗ + tp + ∇g(x∗ )y) = 0. The system has a solution at (y, ˆ tˆ ) = (0, 0). Its Jacobian with respect to y at this point is ∇g(x∗ )T∇g(x∗ + tp + ∇g(x∗ )y)|(y,t)=(0,0) = ∇g(x∗ )T∇g(x∗ ), which by the regularity assumption is nonsingular. Therefore, by the implicit function theorem, there exists a continuously differentiable function y = y(t) in a neighborhood of t = 0 satisfying g(x∗ + tp + ∇g(x∗ )y(t)) = 0. Letting x(t) = x∗ + tp + ∇g(x∗ )y(t), we obtain that x(t) is a feasible curve through x∗ with x(0) = x∗ . It remains only to show that x (0) = p. From the formula for x(t) we have that x (0) = p + ∇g(x∗ )y (0), so we need to show that the second term is zero. Since x(t) is a feasible curve it satisfies ∇g(x∗ )Tx (0) = 0. Hence ∇g(x∗ )Tp + ∇g(x∗ )T∇g(x∗ )y (0) = 0. The first term above is zero because p ∈ N (A(x∗ )). The lemma now follows because of the regularity assumption.

i

i i

i

i

i

i

14.7. Derivation of Optimality Conditions for Nonlinear Constraints

book 2008/10/23 page 519 i

519

If we assume that a local minimizer is a regular point, we can obtain a more useful optimality condition. Let x∗ be a local solution that satisfies the regularity condition. Then any vector p ∈ N (A(x∗ )) is also in T (x∗ ). It follows from (14.7) that pT∇f (x∗ ) = 0

for all p ∈ N (A(x∗ )).

If Z(x∗ ) is a null-space matrix for A(x∗ ), then Z(x∗ )T∇f (x∗ ) = 0. This is the first-order necessary condition for optimality. It states that the reduced gradient at a local minimum must be zero. We caution here that the same condition is also satisfied at a local maximum point. The reduced gradient may also be zero at a point that is neither a local maximum nor a local minimum point, that is, at a saddle point. As in the linear case, we can show that the reduced gradient is zero if and only if there exists an m-dimensional vector λ∗ such that ∇f (x∗ ) = A(x∗ ) λ∗ = T

m

λ∗i ∇gi (x∗ ).

i=1

This is an equivalent statement of the first-order necessary condition for optimality. The coefficients { λ∗i } are the Lagrange multipliers. We now derive the second-order conditions for optimality. Recall that if x∗ is a local minimizer, then x∗ is a local minimizer along any feasible curve passing through x∗ . Let x(t) be any such curve with x(0) = x∗ . Then since t = 0 is a local minimizer of the function f (x(t)), the second derivative of f (x(t)) with respect to t must be nonnegative at t = 0. Using the chain rule we obtain , d + T d2 f (x(t)) = x (t) ∇f (x(t)) = x (t)T∇ 2 f (x(t))x (t) + ∇f (x(t))Tx (t). 2 dt dt Hence d2 f (x(0)) = pT∇ 2 f (x∗ )p + ∇f (x∗ )Tx (0) ≥ 0, dt 2 where p = x (0) is the tangent to the curve at x∗ . In the expression above, the term ∇f (x∗ )Tx (0) does not necessarily vanish. Therefore the second derivative along an arc depends not only on the Hessian of the objective, but also on the curvature of the constraints (that is, on the term x (0)). To transform this into a more useful condition, it will be convenient to get rid of the term involving x (0). To do this, we notice that gi (x(t)) is constant, so its second derivative with respect to t must vanish for all t, in particular at t = 0. Using the chain rule we obtain p T∇ 2 gi (x∗ )p + ∇gi (x∗ )Tx (0) = 0. We can multiply the last equality by λ∗i and sum over all i. If we subtract the result from the previous inequality, then, because ∇x L(x∗ , λ∗ ) = 0, the term involving x (0) will be eliminated. The final result is that ' ( m

T 2 2 p ∇ f (x∗ ) − λ∗i ∇ gi (x∗ ) p ≥ 0 i=1

i

i i

i

i

i

i

520

book 2008/10/23 page 520 i

Chapter 14. Optimality Conditions for Constrained Problems

Figure 14.8. Feasible arcs. for all tangent vectors p ∈ T (x∗ ). The term in brackets is the Hessian of L with respect to x at the point (x, λ). Therefore + 2 , L(x∗ , λ∗ ) p ≥ 0 pT ∇xx for all tangent vectors p ∈ T (x∗ ). Under the regularity assumption, this inequality will 2 hold for any p in N (A(x∗ )). Consequently, the reduced Hessian Z(x∗ )T∇xx L(x∗ , λ∗ )Z(x∗ ) must be positive semidefinite. This is the second-order necessary condition for optimality. The proof of the sufficiency conditions uses similar techniques. Finally, we consider a problem with nonlinear inequality constraints: minimize subject to

f (x) gi (x) ≥ 0, i = 1, . . . , m.

Optimality conditions can be derived by combining the ideas developed for problems with nonlinear equalities with those for problems with linear inequalities. There are a few issues which are unique to problems with nonlinear inequalities, however. We discuss them briefly. Let x∗ be a feasible solution to the inequality-constrained problem. Whereas in the case of equality constraints we can maintain feasibility by moving in either direction along a feasible curve through x∗ , here it is often possible to move in only one direction; we shall call this “movement along a feasible arc.” More formally, we define an arc emanating from x∗ as a directed curve x(t) parameterized by the variable t in an interval [0, T ] for which x(0) = x∗ . An arc is feasible if g(x(t)) ≥ 0 for t in [0, T ]. Some examples of feasible arcs are illustrated in Figure 14.8. The optimality conditions are a result of the requirement that if a small movement is made along a feasible arc, the objective value will not decrease. The constraints that are inactive at x∗ can be ignored, since they do not influence the local optimality conditions. With the regularity assumption, it is possible to derive the firstand second-order conditions for optimality. The proofs are left to the Exercises.

Exercises 7.1. Consider the constraint g(x) = (x2 − x12 )(x12 − x22 ) = 0. Find the tangent cone and the null space of the Jacobian matrix at x∗ = (0, 0)T.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 521 i

521

7.2. Consider the problem minimize subject to

f (x) = x2 x2 = 0 x2 − x13 = 0.

Show that the solution is x∗ = (0, 0)T. Show that there exists a vector of multipliers λ∗ such that ∇L(x∗ , λ∗ ) = 0, even though T (x) = N (A(x)). 7.3. Let x∗ be a feasible point to an equality-constrained problem, and let T (x∗ ) be the tangent cone at x∗ . Prove that if 0 ∈ T (x∗ ), then T (x∗ ) is a cone. (Hint: Prove that if x(t) is a feasible arc through x∗ , then so is x(αt).) 7.4. Let x∗ be a feasible point to the inequality-constrained problem. Prove that if x(t) is a feasible arc emanating from x∗ , then x (0)T∇gi (x∗ ) ≥ 0 for all binding constraints i. 7.5. Assume that x∗ is a regular point for the inequality-constrained problem, and that there exists some λ such that ∇x L(x∗ , λ) = 0 and λTg(x∗ ) = 0. Suppose that λ1 < 0. Prove that there exists some feasible arc x(t) emanating from x∗ such that df (x(t))   = λ1 . t=0 dt Hence, x∗ cannot be a local minimizer. 7.6. Use the results of the previous two problems to prove Theorem 14.18. 7.7. Prove Theorem 14.19. 7.8. Consider the problem with a single constraint: minimize

f (x)

subject to

g(x) ≥ 0.

It is possible to transform the inequality constraint into an equality constraint by subtracting a squared variable, say y 2 , from g. We obtain a problem with n + 1 variables and a single equality constraint. Write the first- and second-order optimality conditions for this problem, and compare them to the optimality conditions for the original inequality-constrained problem. Also, determine the conditions satisfied by a regular point for this problem and compare them to the conditions satisfied by a regular point of the original problem. 7.9. Consider the problem minimize f (x) subject to g(x) = 0, where x ∈ n and g is a vector function. Let x∗ be a regular point of the constraints. Consider now the equivalent problem minimize subject to

f (x) g(x) ≥ 0 −g(x) ≥ 0.

Prove that x∗ is no longer a regular point of the constraints for this new problem, but that there exists a vector of Lagrange multipliers that satisfies Theorem 14.18. Is the vector of multipliers unique?

i

i i

i

i

i

i

522

book 2008/10/23 page 522 i

Chapter 14. Optimality Conditions for Constrained Problems

7.10. It is possible to derive optimality conditions that do not require that T (x∗ ) = N (A(x∗ )). This was done by Fritz John (1948) who defined a “weak Lagrangian” that includes a multiplier for the objective. Consider the problem minimize subject to

f (x) g(x) ≥ 0,

where x ∈ n , g is vector function, and all functions are continuously differentiable. John showed that if x∗ is a local minimizer of the problem, then there exist multipliers θ∗ , λ∗ not all zero so that θ∗ ∇f (x∗ ) − λ∗ T∇g(x∗ ) = 0, λ∗ Tg(x∗ ) = 0, and λ∗ ≥ 0. (i) Use this result to prove that if x∗ is a regular point of the constraints, then θ∗ = 0. (ii) Consider the problem of minimizing f (x) = −x1 subject to the constraint (1 − x1 )3 − x2 ≥ 0 and x1 x2 ≥ 0. The local minimizer is x∗ = (1, 0)T but it is not a regular point. Show that there are no multipliers that satisfy our regular optimality condition, but the Fritz John conditions are satisfied. (iii) Consider now a problem with equality constraints g(x) = 0 that are split into two inequalities as in Exercise 7.9. Prove that the Fritz John conditions are satisfied by every feasible point. This illustrates one major weakness of these conditions.

14.8

Duality

We have already encountered the concept of duality in the chapters on linear programming (Chapters 4–10), in which we saw that every linear programming problem has an associated dual linear programming problem that is intimately related to it. There are several connections between a linear problem (the primal problem) and its dual: (i) if the primal is a minimization problem, the dual problem is a maximization problem, and vice versa; (ii) the dual of the dual problem is the primal problem; (iii) the objective value for any feasible solution to the maximization problem is a lower bound on the objective value for any feasible solution to the minimization problem (the weak duality theorem); (iv) if one problem has an optimal solution, then so does the other, and the optimal objective values of the two problems are equal (the strong duality theorem). The relationship between primal and dual linear programs has immense value from both theoretical and computational points of view. First, the dual problem may be easier to solve, and if the optimal solution to the dual problem is known, then (in nondegenerate cases) the optimal solution to the primal problem can easily be computed. Second, a good estimate of the optimal dual solution may assist in obtaining a good estimate of the optimal primal solution. In addition, the dual variables have an important economic significance and can be used for sensitivity analysis (see Section 6.4). The first-order optimality conditions for nonlinear optimization are stated not only in terms of the vector of variables x∗ but also in terms of a vector of optimal Lagrange multipliers λ∗ . The Lagrange multipliers are the dual variables. If the optimal Lagrange multipliers were known a priori, the optimization problem would often be easier to solve. Thus it would be useful if we could easily compute λ∗ . Hence the question, can we define

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 523 i

523

a new nonlinear optimization problem, where the unknown variables are the Lagrange multipliers, and the solution is λ∗ ? Furthermore, under what conditions will the solution to this new problem also provide us with a solution to the original problem? Duality theory examines these questions. In this section we develop a duality theory for nonlinear optimization. Specifically, we define for every nonlinear optimization problem a related dual problem. Ideally we would like the relationships between a pair of primal and dual nonlinear problems to replicate those of primal and dual linear programs. As we shall see, this is not always possible. Various possible formulations have been proposed for the dual of a nonlinear problem. The fundamental idea underlying most approaches is to represent a constrained minimization problem in a form that will be termed a “min-max” problem. Its dual problem will be represented in a form termed a “max-min” problem. These two problems can be viewed as strategy problems for two players in a game. We describe this idea next.

14.8.1

Games and Min-Max Duality

Let us consider a game between two players, Peter and Harriet. In this game, Peter has a set of possible strategies X, while Harriet has a set of possible strategies Y . The game proceeds as follows: Peter chooses a strategy x ∈ X, and Harriet chooses a strategy y ∈ Y . The choices of strategies are then revealed simultaneously. As a result, Peter pays an amount F(x, y) to Harriet (the amount paid can be negative, in which case, Peter actually gains). The game is called a zero-sum game because whatever one player wins, the other player loses. We now make the assumption that both Peter and Harriet act rationally to maximize their rewards. Suppose in fact that both players would like to take a course of action that will guarantee their largest gain, regardless of what their opponent does. Then both players would attempt to optimize their worst-case scenario. Based on these premises, we now analyze the players’ optimal strategies. Consider first Peter, who is worried about making a large payoff to Harriet. If Peter chooses strategy x ∈ X, then in the worst case (that is, if Harriet is either very clever or very lucky) his payoff to Harriet will be F ∗ (x) = max F(x, y). y∈Y

(In strict mathematical terms, we should use the “supremum” operator15 rather than the “maximum” operator, because there may be no y ∈ Y for which a maximum value is achieved; here for simplicity we ignore this possibility.) To minimize this worst-case payoff, Peter has to choose the strategy that solves the optimization problem minimize F ∗ (x). x∈X

This problem is referred to as a min-max problem, since it seeks the value min max F(x, y). x∈X y∈Y

15 The

supremum of a set is its least upper bound; the infimum of the set is its greatest lower bound. If the supremum or infimum exists, it need not belong to the set.

i

i i

i

i

i

i

524

book 2008/10/23 page 524 i

Chapter 14. Optimality Conditions for Constrained Problems

Harriet, on the other hand, is worried about receiving a payoff that is too small. If she chooses a strategy y ∈ Y , then in the worst case, the payoff that she will receive will only be F∗ (y) = min F(x, y). x∈X

(For simplicity we use the “minimum” operator instead of the more precise “infimum” operator.) Harriet’s optimal strategy is to maximize the worst-case payoff that she will receive. Hence she must solve the problem maximize F∗ (y). y∈Y

This problem is referred to as a max-min problem, since it seeks the value max min F(x, y). y∈Y x∈X

The two problems are said to be dual to each other. We refer to the min-max problem faced by Peter as the primal problem. The objective to be minimized, F ∗ (x), is referred to as the primal function. We refer to the max-min problem faced by Harriet as the dual problem. The objective to be maximized, F∗ (y), is referred to as the dual function. For any x ∈ X and y ∈ Y , F∗ (y) = min F(x, y) ≤ F(x, y) ≤ max F(x, y) = F ∗ (x), x∈X

y∈Y

and thus in particular

(14.4)

F∗ (y) ≤ F ∗ (x).

This is the statement of weak duality. A consequence of the weak duality statement is that the optimal solution of the maxmin problem is bounded above by the optimal value of the min-max problem. This result is summarized in the following lemma. Lemma 14.27. max min F(x, y) ≤ min max F(x, y). y∈Y x∈X

x∈X y∈Y

Proof. From (14.4) it follows that min F(x, y) ≤ max F(x, y). x∈X

y∈Y

This holds for any x ∈ X and y ∈ Y , so it holds for the y that maximizes the left-hand term and for the x that minimizes the right-hand term. Thus max min F(x, y) ≤ min max F(x, y). y∈Y x∈X

x∈X y∈Y

Example 14.28 (Two-Person Zero-Sum Game). Suppose that Peter has a set of two possible strategies, denoted X = { 1, 2 }, and that Harriet also has a set of two possible strategies,

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 525 i

525

denoted Y = { 1, 2 }. If Peter chooses strategy i ∈ X and Harriet chooses strategy j ∈ Y , Peter’s payoff will be F (i, j ) = ai,j , where A = (ai,j ) is given as   −1 2 . A= 4 3 Then Peter’s min-max problem is to choose the strategy that solves minimize max ai,j . i

Now

j

 min max ai,j = min max a1,j , max a2,j i

j

j

j

= min { 2, 4 } = 2,

and hence Peter’s optimal strategy would be to choose row i = 1, thereby guaranteeing that his payoff to Harriet will be at most 2. Harriet’s max-min problem is to choose the strategy that solves maximize min ai,j . j

Now

i

 max min ai,j = max min ai,1 , min ai,2 j

i

i

i

= max { −1, 2 } = 2,

and hence Harriet’s optimal strategy would be to choose column j = 2, thereby guaranteeing that her reward will be at least 2. In this case we see that max-min = 2 = min-max. The game can be considered to be in equilibrium, in the sense that neither player can gain from a change in strategy as long as the opponent’s strategy remains fixed. It is not always true that max-min = min-max. If the matrix   −1 2 ¯ A= 4 1 were used instead of A, then we would obtain that max-min = 1 ≤ 2 = min-max. In this example, element a12 of A is largest in its row and smallest in its column. If such an element exists, a game of this type is said to have a saddle point. The matrix A¯ does not have a saddle point. As we will see, the optimal primal and dual objectives are equal if and only if the game has a saddle point. We first give a more general definition. A point (x∗ , y∗ ) with x∗ ∈ X and y∗ ∈ Y is said to satisfy the saddle-point condition for F if F(x∗ , y) ≤ F(x∗ , y∗ ) ≤ F(x, y∗ ) for all x ∈ X and y ∈ Y . Thus, x∗ is a minimizer of F when y is fixed at y∗ , and y∗ is a maximizer of F when x is fixed at x∗ .

i

i i

i

i

i

i

526

book 2008/10/23 page 526 i

Chapter 14. Optimality Conditions for Constrained Problems

The following lemma states under what conditions the optimal values of the two problems are equal. Lemma 14.29 (Strong Duality). The condition max min F(x, y) = min max F(x, y) y∈Y x∈X

x∈X y∈Y

(14.5)

holds if and only if there exists a pair (x∗ , y∗ ) that satisfies the saddle-point condition for F. Proof. Suppose that (x∗ , y∗ ) satisfies the saddle-point condition. Then max F(x∗ , y) ≤ F(x∗ , y∗ ) ≤ min F(x, y∗ ). y∈Y

x∈X

Now the left-hand term in the inequality above is bounded below by min max F(x, y) ≤ max F(x∗ , y), x∈X y∈Y

y∈Y

and the right-hand term in the inequality above is bounded above by min F(x, y∗ ) ≤ max min F(x, y). x∈X

y∈Y x∈X

Combining the last three inequalities, we obtain that min max F(x, y) ≤ F(x∗ , y∗ ) ≤ max min F(x, y), x∈X y∈Y

y∈Y x∈X

or in short, min-max ≤ max-min. But in view of Lemma 14.27, this can be true only if min-max = max-min, and therefore max min F(x, y) = F(x∗ , y∗ ) = min max F(x, y). y∈Y x∈X

x∈X y∈Y

Suppose now that (14.5) holds. Then max min F(x, y) = F(x∗ , y∗ ) = min max F(x, y) y∈Y x∈X

x∈X y∈Y

for some (x∗ , y∗ ). Therefore for any x ∈ X and y ∈ Y , F(x∗ , y) ≤ max F(x∗ , y) = F(x∗ , y∗ ) = min F(x, y∗ ) ≤ F(x, y∗ ), y∈Y

x∈X

and therefore (x∗ , y∗ ) satisfies the saddle-point condition for F.

14.8.2

Lagrangian Duality

Min-max duality serves as the basis for developing a dual problem to a nonlinear problem. The main idea is to define some game with payoff function F so that the solution to the minmax problem with respect to F is also the solution to the nonlinear minimization problem. The resulting max-min problem is then the dual problem. There are various ways in which this can be done. The approaches differ in the way the sets X and Y and the function F are

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 527 i

527

defined. Here we describe an approach sometimes termed Lagrangian duality that is useful from a computational point of view. An alternative approach termed conjugate duality is more intricate, yet it is more powerful from a theoretical point of view. We assume that the nonlinear problem has the form minimize subject to

f (x) g(x) ≥ 0 x ∈ X.

(14.6)

Here g is a vector of m functions gi . The set constraint x ∈ X is used to impose additional requirements that we may wish to handle separately. These may be additional explicit functional constraints, such as nonnegativity constraints on the variables. Or, if this were a discrete problem, these may be the integrality requirements, and X would be the set of points in n with integer components (this option is useful in developing an approach for solving integer programs). When X = n , there are no “special” requirements and, we can omit this constraint from the statement of the problem. Consider now the Lagrangian function L(x, λ) = f (x) − λTg(x) for x ∈ X ⊂ n and λ ∈ m , λ ≥ 0; here g is the vector of constraint functions gi . We will show that the nonlinear optimization problem can be represented as a min-max problem. The Lagrangian L(x, λ) will assume the role of F in this representation, and the set { λ ∈ m , λ ≥ 0 } will assume the role of the set Y . We first define L∗ (x) = max L(x, λ) λ≥0

for any x ∈ X. This is the primal function. Let us take a closer look at this function for a fixed x: L∗ (x) = max[f (x) − λTg(x)]. λ≥0

If g(x) ≥ 0, then λ g(x) will be nonnegative. Thus the Lagrangian will be maximized when the second term is zero. This is achieved, for example, if λ = 0, and we then obtain that L∗ (x) = f (x). If on the contrary gi (x) < 0 for some constraint, then by letting the multiplier λi increase without limit and keeping all other multipliers equal to zero, the Lagrangian will increase without limit. Therefore f (x) if g(x) ≥ 0 L∗ (x) = ∞ otherwise. Now the min-max primal problem is T

minimize L∗ (x). x∈X



If we ignore the regions where L is infinite, then this problem becomes our original constrained problem minimize f (x) subject to g(x) ≥ 0 x ∈ X. Thus the original constrained nonlinear problem is represented as a min-max problem.

i

i i

i

i

i

i

528

book 2008/10/23 page 528 i

Chapter 14. Optimality Conditions for Constrained Problems

We can now utilize min-max duality to formulate a dual problem. For any λ ≥ 0 the dual function is defined as L∗ (λ) = min L(x, λ). x∈X

The resulting max-min dual problem becomes maximize L∗ (λ). λ≥0

This is the nonlinear dual problem, with dual variables λ. More explicitly, the dual problem can be written in the form maximize min[f (x) − λTg(x)]. λ≥0

x∈X

Throughout this discussion we have assumed that in the original problem, all the constraints involving { gi } are inequalities. There is no conceptual difficulty if some constraints are equalities, however. If some gi is required to be exactly zero, then in the definition of the dual function its associated multiplier λi will be unrestricted in sign. We now give an example. Unless stated otherwise, in the examples in this section we assume that the set X is the entire space n . Example 14.30 (Dual Problem). Consider the problem minimize

f (x) = x 2

subject to

x ≥ 1.

The solution to this problem is x∗ = 1. The Lagrangian function is L(x, λ) = x 2 − λ(x − 1). Therefore the dual function is L∗ (λ) = min L(x, λ) = min[x 2 − λ(x − 1)] x

x

for λ ≥ 0. The function on the right is a quadratic in x whose minimizer is x = λ/2. Thus the dual function takes the form L∗ (λ) = λ − 14 λ2 for λ ≥ 0. The dual problem is therefore maximize λ − 14 λ2 . λ≥0

It is easy to see that the solution is λ∗ = 2, which is indeed the Lagrange multiplier corresponding to x∗ . The optimal dual objective value is L∗ (λ∗ ) = 1, and it is equal to the optimal objective value f (x∗ ). In this example we succeeded in obtaining an explicit expression for the dual function. Unfortunately, this will not always be possible, as is demonstrated in the following example.

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 529 i

529

Example 14.31 (Dual Function Not Available Explicitly). Consider the problem minimize subject to

f (x) = ex 1 − x 2 ≥ 0.

The dual function is L∗ (λ) = min L(x, λ) = min ex − λ(1 − x 2 ). x

x

For any fixed λ ≥ 0, the function ex − λ(1 − x 2 ) is convex, and hence any local minimizer will also be a global minimizer. This minimizer is the solution x = x(λ) of the nonlinear equation ex + 2xλ = 0. For a given value λ, the solution can be found numerically, but this solution cannot be expressed as an explicit function of λ. The dual problem is thus maximize ex − λ(1 − x 2 ), λ≥0

where x solves ex + 2xλ = 0. Equivalently, we can write this problem in the form maximize

ex − λ(1 − x 2 )

subject to

ex + 2xλ = 0 λ ≥ 0.

x,λ

If we represent the primal problem in the form minimize subject to

f (x) = ex −1 ≤ x ≤ 1,

then the dual can be written explicitly. Thus the form of the dual depends on the particular way in which the primal is written. Examples of problems where the dual function cannot be given explicitly are common. The statement of the dual problem may include the original variables as well as the dual ¯ to be dual feasible if x¯ ∈ X, λ¯ ≥ 0, and x¯ minimizes variables. Thus we define a point (x, ¯ λ) ¯ ¯ = (−1, 1 e−1 ) is a dual feasible solution. L(x, λ). In the previous example the point (x, ¯ λ) 2 Let us now examine the relationship between a nonlinear problem and its dual. If x ¯ is feasible to the dual is feasible to the primal problem, then L∗ (x) = f (x), and if (x, ¯ λ) ¯ ¯ ¯ ≤ L∗ (x). We problem, then L∗ (λ) = L(x, ¯ λ). From weak duality, we know that L∗ (λ) therefore obtain the following theorem. Theorem 14.32 (Weak Duality). Let x be a feasible solution to the primal problem (14.6), ¯ be a feasible solution to its dual problem. Then and let (x, ¯ λ) ¯ ≤ f (x). f (x) ¯ − λ¯ Tg(x) The following is a consequence of the weak duality theorem.

i

i i

i

i

i

i

530

book 2008/10/23 page 530 i

Chapter 14. Optimality Conditions for Constrained Problems

Corollary 14.33. max L∗ (λ) ≤ min { f (x) : g(x) ≥ 0 } . x∈X

λ≥0

If we define the dual problem to be infeasible when L∗ (λ) = −∞ for all λ ≥ 0, then we have the following corollary. Corollary 14.34. If a (primal) nonlinear optimization problem is unbounded, then its dual is infeasible. If the dual is unbounded, then the primal is infeasible. Corollary 14.33 states that the optimal objective value of the primal problem is greater than or equal to the optimal value of the dual problem. In Example 14.30 the optimal objective values of the primal and dual problems were equal. This may lead us to believe that, just as in linear programming, this result will always be true whenever an optimal solution to the problems exists. This is not the case, however. There are problems for which a duality gap exists, where the optimal value of the primal is strictly greater than the optimal value of the dual. This is illustrated in the next example. Example 14.35 (Duality Gap). Consider the problem minimize subject to

f (x) = −x 2 x=1 x ∈ X,

where X = { x : 0 ≤ x ≤ 2 }. The solution is clearly x∗ = 1 with optimal objective value −1. Denote by λ the Lagrange multiplier associated with the constraint x = 1. Because the constraint is an equality, λ is no longer restricted to being nonnegative. The Lagrangian function is L(x, λ) = −x 2 − λ(x − 1), x ∈ X, −∞ ≤ λ ≤ ∞. The dual function is L∗ (λ) = min L(x, λ) = min −x 2 − λ(x − 1). x∈X

0≤x≤2

The function −x 2 − λ(x − 1) has no local minimizer, and hence it will attain its minimum in X either at x = 0 or at x = 2. Comparing function values, we obtain  λ if λ < −2 L∗ (λ) = −4 − λ if λ ≥ −2. The dual function is depicted in Figure 14.9. The maximum of the dual function is at λ∗ = −2. At this point the optimal dual objective is L∗ (λ∗ ) = −2. Since the optimal primal objective is −1, the two optimal objective values are not equal. The duality gap is the difference f (x∗ ) − L∗ (λ∗ ) = 1. It is possible also to construct examples with an infinite duality gap, as the next example shows.

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 531 i

531 −1 −1.5 −2 −2.5 −3 −3.5 −4 −4.5 −5 −5.5 −6 −4

−3

−2

−1

0

1

λ

2

Figure 14.9. Dual function. Example 14.36 (Infinite Duality Gap). Consider the problem f (x) = −x 2 0 ≤ x ≤ 1.

minimize subject to

The solution is x∗ = 1 with corresponding Lagrange multiplier λ∗1 = 0 for the lower bound constraint and λ∗2 = 2 for the upper bound constraint. The Lagrangian function is L(x, λ) = −x 2 − λ1 x − λ2 (1 − x), and the dual function is L∗ (λ1 , λ2 ) = min L(x, λ) = min[−x 2 − λ1 x − λ2 (1 − x)] = −∞ x

x

for all λ1 ≥ 0 and λ2 ≥ 0. Therefore the dual problem maximize L∗ (λ1 , λ2 ) λ

has an optimal objective value of −∞. Under what conditions are the optimal primal and dual objectives guaranteed to be equal? The strong duality theorem of the previous section indicates that this will be true if and only if there is some point (x∗ , λ∗ ) that satisfies the saddle-point condition L(x∗ , λ) ≤ L(x∗ , λ∗ ) ≤ L(x, λ∗ ) for all x ∈ X and λ ≥ 0. The last two examples show that it is possible that no (x∗ , λ∗ ) satisfies the saddle-point condition, even if the problem has an optimal solution. There is one important class of problems for which, under mild conditions, the saddlepoint condition is guaranteed to be satisfied. These are problems of the form minimize subject to

f (x) gi (x) ≥ 0,

i = 1, . . . , m,

(14.7)

where f is a convex function and each gi is a concave function. Such problems are convex optimization problems. (The result can be extended to include linear equalities; see Example 14.38.)

i

i i

i

i

i

i

532

book 2008/10/23 page 532 i

Chapter 14. Optimality Conditions for Constrained Problems

Theorem 14.37 (Convex Duality). Consider the convex optimization problem (14.7) in which all functions are assumed to be continuously differentiable. Let x∗ be a solution to the problem, and assume that x∗ is a regular point of the constraints. Let λ∗ be the vector of Lagrange multipliers corresponding to x∗ . Then (x∗ , λ∗ ) is dual feasible, λ∗ solves the dual problem, and the optimal primal and dual function values are equal. Proof. It is sufficient to show that (x∗ , λ∗ ) satisfies the saddle-point condition for L. Since f is convex, gi are concave, and λ∗ ≥ 0, the function L(x, λ∗ ) = f (x) − λTg(x) is a convex function of x. Consequently, the first-order optimality condition ∇x L(x∗ , λ∗ ) = 0 implies that x∗ minimizes L(x, λ∗ ), and hence L(x∗ , λ∗ ) ≤ L(x, λ∗ ) for all x. In addition, the complementary slackness conditions at x∗ imply that λ∗ Tg(x∗ ) = 0. Thus L(x∗ , λ∗ ) = f (x∗ ), and for any λ ≥ 0 we have L(x∗ , λ) = f (x∗ ) − λTg(x∗ ) ≤ f (x∗ ) = L(x∗ , λ∗ ). Therefore L(x∗ , λ) ≤ L(x∗ , λ∗ ) ≤ L(x, λ∗ ) and (x∗ , λ∗ ) satisfies the saddle-point condition. The problem of Example 14.30 is convex, and indeed the optimal primal and dual objectives are equal. In Examples 14.35 and 14.36, where we observed a duality gap, the problems are not convex. It is also possible to construct examples of problems which are not convex, but where the duality gap is zero.

14.8.3 Wolfe Duality When all problem functions are continuously differentiable, the dual of a convex problem can be represented in a more convenient form. For any fixed λ, the point x¯ minimizes L(x, λ) if and only if ∇x L(x, λ)|x=x¯ = 0. Because of this we can state the dual in the form maximize

L(x, λ)

subject to

∇x L(x, λ) = 0.

x,λ≥0

This representation is sometimes called the Wolfe dual.

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 533 i

533

Example 14.38 (Dual of a Linear Program). Consider the linear program minimize subject to

f (x) = cTx Ax = b x ≥ 0.

Denoting by y the vector of Lagrange multipliers for the linear equalities, and by λ ≥ 0 the vector of Lagrange multipliers for the nonnegativity constraints, we obtain the Lagrangian L(x, y, λ) = cTx − y T(Ax − b) − λTx. The dual problem is maximize

L(x, y, λ) = cTx − y T(Ax − b) − λTx

subject to

c − ATy − λ = 0.

λ≥0

The equality constraint implies that cTx − y TAx − λTx = 0. Substituting this into the dual objective, the dual problem may be rewritten in the form maximize

bTy

subject to

AT y ≤ c

which is equivalent to the dual of a linear program in standard form. The dual of a linear program is a linear program. The next example shows that the dual of a strictly convex quadratic program is a quadratic program. Example 14.39 (Dual of a Quadratic Program). Consider the quadratic program minimize subject to

f (x) = 12 x TQx + cTx Ax ≥ b,

where Q is a positive-definite matrix. This is a convex problem, and hence the Wolfe dual problem exists: maximize 21 x TQx + cTx − λT(Ax − b) x,λ

subject to

Qx + c − ATλ = 0 λ ≥ 0.

It follows from the equality constraint that x = Q−1 (ATλ − c). When this is used to eliminate x, the resulting dual problem involves only λ: maximize

− 12 λT(AQ−1 AT )λ + (AQ−1 c + b)Tλ − 12 cTQ−1 c

subject to

λ ≥ 0.

λ

This is also a quadratic program.

i

i i

i

i

i

i

534

14.8.4

book 2008/10/23 page 534 i

Chapter 14. Optimality Conditions for Constrained Problems

More on the Dual Function

The correspondence between the solutions of the primal and dual problems has useful implications. First, the dual problem could be used to obtain estimates of the optimal Lagrange multipliers. Good multiplier estimates could in turn provide good solution estimates for the primal. Alternatively, if deemed more convenient, the dual instead of the primal problem could be solved directly. For convex problems (14.7), there is a correspondence between the primal and dual solutions. As we have already seen, for nonconvex problems such a correspondence may not hold. Nevertheless, it is possible in certain cases to define a local duality theory. We use the name “local duality” because we restrict the problem to a neighborhood of a local solution. To obtain the primal/dual correspondence we assume that the Lagrangian at the local solution is strictly convex. In this section we develop the local duality theory. We also study properties of the dual function that are useful in algorithms. First, we show that the dual function is concave. Surprisingly, this property holds even if the primal problem is not convex. To prove this result, let λ1 and λ2 be any two nonnegative multipliers, and let α be a scalar such that 0 ≤ α ≤ 1. Then L∗ (αλ1 + (1 − α)λ2 )

= min f (x) − (αλ1 + (1 − α)λ2 )Tg(x) x∈X

= min α[f (x) − λT1 g(x)] + (1 − α)[f (x) − λT2 g(x)] x∈X

≥ α min f (x) − λT1 g(x) + (1 − α) min f (x) − λT2 g(x) x∈X

x∈X

= αL∗ (λ1 ) + (1 − α)L∗ (λ2 ),

and so the dual function is concave. The concavity of the dual function is an appealing property, since it implies that every local maximizer of the dual function is also a global maximizer. It suggests also that an algorithm for solving the dual may not encounter some of the difficulties associated with maximizing a nonconcave function (these difficulties are similar to those incurred when minimizing a nonconvex function). Note that solving the dual only gives bounds on the primal objective unless the duality gap is known to be zero. The latter will be true for a convex optimization problem under the assumptions stated in Lemma 14.10. It will also be true under the convexity assumptions of the local duality theory presented below. To develop the local duality theory we consider the problem minimize subject to

f (x) gi (x) ≥ 0,

i = 1, . . . , m,

(14.8)

where f and all gi are twice continuously differentiable. Let x∗ be a local solution to this problem, and assume that it is a regular point. Let λ∗ be the corresponding vector of Lagrange multipliers, so that ∇L(x∗ , λ∗ ) = ∇f (x∗ ) − ∇g(x∗ )λ∗ = 0. We will now require the assumption that the Lagrangian Hessian 2 ∇xx L(x∗ , λ∗ )

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 535 i

535

is positive definite. This assumption is stronger (that is, more restrictive) than the assumption made in the second-order sufficiency conditions that the reduced Lagrangian Hessian is positive definite. Consider the system of equations ∇L(x, λ) = ∇f (x) − ∇g(x)λ = 0. The system has a solution (x∗ , λ∗ ), and its Jacobian with respect to x at this point, the 2 matrix ∇xx L(x∗ , λ∗ ), is positive definite. It follows from the implicit function theorem (see Appendix B.9) that there exist neighborhoods of x∗ and λ∗ such that every λ in the neighborhood of λ∗ has a unique corresponding point x = x(λ) in the neighborhood of x∗ 2 that solves this system of equations, and furthermore, ∇xx L(x, λ) is positive definite. Let us denote such a neighborhood of x∗ by X. Then every λ sufficiently close to λ∗ has a unique corresponding x that is the global minimizer of L(x, λ) in X. Suppose now that we restrict our attention to the solution of (14.8) in the neighborhood X of x∗ . Then the primal problem can be written locally as minimize

f (x)

subject to

gi (x) ≥ 0.

x∈X

The dual function for this local problem takes the form L∗ (λ) = min L(x, λ). x∈X

When λ is sufficiently close to λ∗ , L∗ (λ) = L(x(λ), λ) = f (x(λ)) − λTg(x(λ)),

(14.9)

where x(λ) is the unique point near x∗ such that ∇f (x(λ)) − ∇g(x(λ))λ = 0. The problem maximize L∗ (λ) λ≥0

is termed the local dual problem. The equality of the local optimal primal and dual objective values is established in the following theorem. Theorem 14.40 (Local Duality). Consider the problem (14.8) in which all functions are assumed to be twice continuously differentiable. Let x∗ be a local solution to the problem that is a regular point of the constraints. Let λ∗ be the corresponding vector of Lagrange 2 L(x∗ , λ∗ ) is positive definite. Then λ∗ is a solution of multipliers, and assume that ∇xx the local dual problem, (x∗ , λ∗ ) is dual feasible, and the optimal primal and dual function values are equal. Proof. We prove that (x∗ , λ∗ ) satisfies the saddle-point condition for the Lagrangian. The results then follow from the strong duality theorem.

i

i i

i

i

i

i

536

book 2008/10/23 page 536 i

Chapter 14. Optimality Conditions for Constrained Problems

2 L(x∗ , λ∗ ) is positive definite, x∗ minimizes Because ∇x L(x∗ , λ∗ ) = 0 and ∇xx L(x, λ∗ ), and L(x∗ , λ∗ ) ≤ L(x, λ∗ )

for all x ∈ X. Also, because λ ≥ 0 and g(x∗ ) ≥ 0, and because of the complementary slackness at x∗ , L(x∗ , λ) = f (x∗ ) − λTg(x∗ ) ≤ f (x∗ ) = L(x∗ , λ∗ ) for all λ ≥ 0. Therefore (x∗ , λ∗ ) satisfies the saddle-point condition. As already mentioned, for λ sufficiently close to λ∗ , the dual function takes the form (14.9), where x(λ) is the minimizer of the Lagrangian close to x∗ . It is not necessary to specify a set X explicitly to compute the point x(λ) and the corresponding value of the dual function L∗ (λ). Example 14.41 (Local Duality). Consider the problem f (x) = −3x 1 − x 3 ≥ 0.

minimize subject to

The optimal point is clearly x∗ = 1 and the corresponding objective value is −3. The Lagrangian function for the problem is L(x, λ) = −3x − λ(1 − x 3 ), and the first-order necessary condition ∇x L(x, λ) = −3 + 3λx 2 = 0 at x∗ yields λ∗ = 1. The dual function is L∗ (λ) = min L(x, λ) = min{−3x − λ(1 − x 3 )} = −∞ x

x

for all λ ≥ 0, and hence the dual problem is infeasible. Notice, however, that 2 ∇xx L(x, λ) = 6λx

⇒

2 ∇xx L(x∗ , λ∗ ) = 6 > 0

and as a result, the local duality theorem applies. We thus focus on the problem restricted to an appropriate neighborhood of x∗ . To find a local minimizer of the Lagrangian for λ close to λ∗ = 1, note that ∇x L(x, λ) = −3 + 3λx 2 = 0

⇒

x 2 = 1/λ.

√ 2 Since ∇xx L(x, λ) is positive definite when both x and λ are positive, then x = x(λ) = 1/ λ is the minimizer of L(x, λ) for λ > 0. It follows that the local dual function has the form √ L∗ (λ) = −2/ λ − λ for λ > 0. Since ∇L∗ (λ∗ ) = (λ∗ )−1.5 − 1 = 0

and

∇ 2 L∗ (λ∗ ) = −1.5(λ∗ )−2.5 = −1.5 < 0,

then λ∗ = 1 is indeed the maximizer of L∗ (λ). Furthermore, x(λ∗ ) = x∗ = 1 and L∗ (λ∗ ) = −3 = f (x∗ ).

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 537 i

537

The equality of the primal and dual objectives, combined with the concavity of the dual function, suggest that solving the dual problem could be a sensible alternative to solving the primal. However, a potential difficulty in this approach is that the dual function is not usually available in explicit form. The evaluation of L∗ at a point λ may require the solution of the optimization problem minx L(x, λ), and so the dual function can be expensive to compute. Despite this, given the value of the dual function at some point λ close to λ∗ , its first and second derivatives at that point can be computed readily. The assumption that is needed 2 L(x∗ , λ∗ ). It follows then from the implicit function again is positive-definiteness of ∇xx theorem that x(λ) is twice continuously differentiable for λ close to λ∗ . This result is used below. To compute the derivatives of the dual function, we note that in a neighborhood of λ∗ it can be written in the form L∗ (λ) = L(x(λ), λ) = f (x(λ)) − λTg(x(λ)). To obtain the gradient of this function we use the chain rule: ∇L∗ (λ) = ∇x(λ)∇x L(x(λ), λ) + ∇λ L(x(λ), λ), where ∇x(λ) is an m × n matrix whose j th column is ∇λ xj (λ). Now ∇x L(x(λ), λ) = 0 because x(λ) is the minimizer of the Lagrangian. Also, ∇λ L(x, λ) = −g(x). Therefore we obtain ∇L∗ (λ) = −g(x(λ)), or in short ∇L∗ = −g. To obtain the second derivative, we differentiate ∇L∗ (λ). Using the previous result and the chain rule, we obtain ∇ 2 L∗ (λ) = −∇x(λ)∇g(x(λ)). Although we do not have an explicit expression for x(λ), we can obtain an expression for its gradient. Since ∇x L(x(λ), λ) = 0 for all λ, we can differentiate this equality with respect to λ to obtain 2 ∇x(λ)∇xx L(x(λ), λ) + ∇λx L(x(λ), λ)T 2 = ∇x(λ)∇xx L(x(λ), λ) − ∇g(x(λ))T = 0.

This implies that and hence

2 ∇x(λ) = ∇g(x(λ))T[∇xx L(x(λ), λ)]−1 , 2 ∇ 2 L∗ (λ) = −∇g(x(λ))T[∇xx L(x(λ), λ)]−1 ∇g(x(λ)).

By omitting the function arguments, we can write this compactly as 2 ∇ 2 L∗ = −∇g T[∇xx L]−1 ∇g.

i

i i

i

i

i

i

538

book 2008/10/23 page 538 i

Chapter 14. Optimality Conditions for Constrained Problems

Example 14.42 (Derivatives of the Dual Function). Consider the quadratic programming problem of Example 14.39. In this case x(λ) is available explicitly: x(λ) = Q−1 (ATλ − c). Using the above formulas with g(x) = Ax − b we obtain ∇L∗ (λ) = −g(x(λ)) = −(A(x(λ)) − b) = −AQ−1 ATλ + AQ−1 c + b. Also, since ∇g(x) = AT and ∇ 2 L(x, λ) = Q, we obtain that ∇ 2 L∗ = −∇g T[∇xx L]−1 ∇g = −AQ−1 AT. The same results could be obtained directly by differentiating the quadratic objective of the dual problem.

14.8.5

Duality in Support Vector Machines

Duality plays an important role in pattern classification via support vector machines, a problem that was presented in Section 1.7.2. Suppose that we have a set of m training points xi ∈ n that are classified by a scalar yi , where yi = 1 if xi has a specified characteristic, and yi = −1 if it does not. We wish to find a separating hyperplane of the form wTx + b, so that all points with yi = 1 lie on one side of the hyperplane, all points with yi = −1 lie on the other side, and with the margin of separation as large as possible. This separating hyperplane will serve as a “machine” that predicts the classification of any new point x¯ based on the sign of wTx¯ + b. We will assume that our training data might not be separable, and we denote the violation of the margin by ξ . Our problem is to find an n-dimensional vector w, an ndimensional vector ξ , and a scalar b that solve the quadratic program minimize

1 T w w 2

+C

m

ξi

i=1

subject to

yi (xiTw + b) ≥ 1 − ξi , ξi ≥ 0.

i = 1, . . . , m,

Here C is a penalty coefficient representing the trade-off between misclassification and a wide separation margin. To define the dual of this problem it will be convenient to represent the problem constraints in matrix-vector form. Denote by X the n × m matrix whose columns are the training vectors xi . Let Y = diag (y) be a diagonal matrix whose ith diagonal term is yi , and let e = ( 1 · · · 1 )T be a vector of length m whose entries are all equal to one. Then the problem becomes minimize 12 w Tw + CeTξ subject to Y XTw + yb ≥ e − ξ ξ ≥ 0. Let α and η be the m-dimensional vectors of Lagrange multipliers corresponding to the hyperplane constraints and the constraints ξ ≥ 0, respectively. Setting the gradient of the

i

i i

i

i

i

i

14.8. Duality

book 2008/10/23 page 539 i

539

Lagrangian to zero implies that w = XY α =

m

αi y i x i .

i=1

The dual problem is therefore given by maximize

m

αi − 12 α T(Y X TXY )α

i=1

subject to

m

y i αi = 0

i=1 αi +

ηi = C α, η ≥ 0 (see the Exercises). The problem can be written just in terms of α as maximize

m

αi − 12 α TY X TXY α

i=1

subject to

m

yi α i = 0

i=1

0 ≤ αi ≤ C. The dual, like the primal, is a quadratic problem. However, it is usually easier to solve because, with the exception of one equality, all constraints are simple upper and lower bounds. From complementary slackness, any αi that is positive corresponds to a binding hyperplane constraint, and hence the corresponding point xi is a support vector. We will denote the set of support vectors by SV . The coefficients of the hyperplane w can then be computed as

w= α i yi x i . i∈SV

Complementary slackness also implies that if αj < C, then ξj = 0. Thus any point xj for which 0 < αj < C satisfies yj (w Txj − b) = 1. Any such point can be used to compute the value of b:

b = wTxj − yj = αi yi xiTxj − yj . i∈SV

If there are several such points, the average computed value of b is commonly taken to ensure the highest accuracy. The significance of the dual formulation, however, is not just its computational ease. It also allows us to expand the power of support vector machines to data that are not linearly separable. Consider, for example, the points shown on the left-hand side of Figure 14.10. They are clearly not separable by a linear equation, and it seems more plausible to separate them by a quadratic equation, say an ellipse centered at the origin, as is shown in the figure on the right. For every point x = (x1 , x2 ) ∈ 2 , the quadratic equation would involve some linear combination of the terms x12 , x1 x2 , and x22 . If we transformed each two-dimensional data vector x into the higher-dimensional “feature” vector (x) = ( x12 x1 x2 x22 )T , we

i

i i

i

i

i

i

540

book 2008/10/23 page 540 i

Chapter 14. Optimality Conditions for Constrained Problems

Figure 14.10. Nonlinear support vector machines. could consider a three-dimensional hyperplane of the form (x)Tw + b that separates the feature vectors corresponding to the data. The coefficients of the hyperplane would in turn provide the coefficient of the best ellipse that separates the data. We could also generalize this idea to define other separating nonlinear functions such as higher-order polynomials, which would involve even more “features.” While this idea is appealing, the dimensionality of the problem could easily explode. The problem of separating an n-dimensional set of data by an ellipsoid centered at the origin is transformed into a separating hyperplane problem of dimension n(n + 1)/2. Separation by higher-order polynomials makes the problem substantially larger. For many applied problems, such as voice recognition or face recognition, the dimension of the data is so large as to make this prohibitive. Luckily the dual formulation offers an approach for efficient computation. Suppose that we mapped the lower-dimensional points x to points (x) in some higher-dimensional space (called “feature space”) and suppose that we used a separating hyperplane for the points (x) in feature space. The dual to the resulting problem would be maximize

m

αi − 12 α TY ((X)T(X))Y α

i=1

subject to

m

yi α i = 0

i=1

0 ≤ αi ≤ C, where (X) is the matrix whose columns are (xi ).

i

i i

i

i

i 2008/1

page 54

i

i

14.8. Duality

541

We now make the observation that the only way the data appear in the dual problem is through the matrix (X)T(X) whose elements are K(xi , xj ) = (xi )T(xj ). It would be advantageous to have an efficient way to compute inner products of the form K(x, z) = (x)T(z) for any two points x and z without going through the trouble of forming (x) and (z). Consider the above problem of separating the data by an ellipse. With (x) = ( x12 x1 x2 x22 )T there are no special savings to be gained in computing the inner product of transformed points. Suppose instead that we defined the transformation to be (x) = √ ( x12 2x1 x2 x22 )T . Then we would still transform the data space to the same feature space, but now, the computation of K(x, z) is easy, since K(x, z) = (x)T(z) = (x Tz)2 . Notice that the inner product is computed in the lower-dimensional input space rather than the higher-dimensional feature space, and it does not require explicit construction of the  vectors. In fact, as long as our function K(x, z) corresponds to inner products of  vectors, we do not even need to know the exact form of  to compute K(x, y), nor do we need to formulate and solve the dual problem. Furthermore, the classification of any new test point x¯ does not require explicit construction of  vectors  either. The decision is determined by the sign of wT(x) ¯ + b. From the formula w = i∈SV αi yi (xi ) we find that



¯ +b = αi yi (xi )T(x) ¯ +b = αi yi K(xi , x) ¯ + b. wT(x) i∈SV

i∈SV

The computation requires only the products K(xi , x) ¯ and does not require that the ’s (or the vector w) be constructed explicitly. (Note that the computation of b requires only products of the form K(xi , xj ); see the Exercises.) The function K(x, z) = (x)T(z) is called the kernel of the machine. Our interest is in kernel functions that can be computed efficiently without constructing . In fact we will not even be concerned with the specific form of . The question is, under what conditions is a given function K(x, z) an admissible kernel? The answer is given in a theorem due to Mercer. Simplified, it states that the matrix of all inner products of any number of points in the data space must be positive semidefinite. Examples of kernels that meet the Mercer condition are the homogeneous polynomial kernel K(x, z) = (x Tz)p and the nonhomogeneous polynomial kernel K(x, z) = (x Tz + 1)p , both for any positive integer p. If, for example, we wish to separate a set of data by a cubic polynomial, we would use p = 3 without worrying about the precise form of the underlying  vector. Another admissible kernel is the widely used Gaussian radial-based kernel K(x, z) = e−x−z

2

/2

.

The associated  vector would be hard to construct since it corresponds to an infinitedimensional feature space. Another example is the sigmoidal kernel K(x, z) = tanh(γ x Tz+ μ), which is admissible for any positive scalars γ and μ. Support vector machines have been successfully used in a wide range of applications. The search for appropriate kernels is a crucial part of effective classification. It is the dual viewpoint that makes this so successful.

i

i i

i

i

i

i

542

book 2008/10/23 page 542 i

Chapter 14. Optimality Conditions for Constrained Problems

Exercises 8.1. Consider the problem

f (x) = ex

minimize

subject to x ≥ 1. What is the solution to this problem? Formulate and solve the dual problem. Formulate the dual to the dual problem and show that it is equivalent to the primal problem. 8.2. Consider the problem of Example 14.30. Formulate the dual to the dual problem and show that it is equivalent to the primal problem. 8.3. Suppose that in the problem of Example 14.35 the constraints 0 ≤ x ≤ 2 are treated explicitly. What would be the dual problem? 8.4. (Fletcher (2000)) Consider the problem minimize

f (x) = 12 ηx12 + 12 x22 + x1

subject to

x1 ≥ 0.

Determine the solution to this problem for the cases η = 1 and η = −1. For each of the two cases, formulate the dual and determine whether its local solution gives the Lagrange multipliers at the optimal primal solution. 8.5. Consider the problem n

minimize f (x) = xi log(xi /ci ) x∈X

subject to

Ax = b,

i=1

where the constants { ci } are positive, A is a matrix of full row rank, and X = { x : x > 0 }. What is the dual to this problem? Determine expressions for the first and second derivatives of the dual function. 8.6. Consider the problem minimize f (x) = −3x subject to 1 − x 3 ≥ 0 presented in Example 14.41. Formulate and solve the dual to the problem using each of the following sets. In each case compare the solution of the dual to the solution of the local dual in Example 14.41. (i) X = { x : 0.5 ≤ x ≤ 1.5 }; (ii) X = { x : 0 < x }; (iii) X = { x : −1 ≤ x }. 8.7. Formulate the dual to the following problem: minimize

f (x) =

n

|xi − ai |

i=1

subject to

n

xi = 0.

i=1

Solve the dual problem, then determine the solution to the primal problem.

i

i i

i

i

i

i

14.9. Historical Background

book 2008/10/23 page 543 i

543

8.8. Let x∗ be an optimal solution to problem (14.6), and assume that it is a regular point of the constraints. Let λ∗ be an optimal solution to the dual problem, and suppose that f (x∗ ) = L∗ (λ∗ ). Prove that λ∗ is the vector of optimal Lagrange multipliers corresponding to x∗ . 8.9. Verify the formulas for the first and second derivatives of the dual function. 8.10. Consider the least-squares problem n

− x¯i )2

minimize

f (x) =

subject to

x1 ≥ x2 ≥ · · · ≥ xn ,

1 (x 2 i

i=1

8.11.

8.12. 8.13. 8.14.

14.9

where x¯i are given constants. Find an explicit form for the dual problem for the case n = 4. Generalize this result for all n. Consider the problem minimize f (x) subject to g(x) ≥ 0, ¯ be where f is a convex function and g is a vector of concave functions. Let (x, ¯ λ) a dual feasible solution for this problem. Determine a lower bound on the optimal objective value f (x∗ ). Verify the formulation of the dual to the separating hyperplane problem. Suppose you wish to separate a set of n-dimensional training points by a polynomial of degree 4. What would be the size of the feature space? Let K(x, z) be the kernel of a nonlinear support vector machine, and suppose an optimal solution α to the dual problem is found. Describe how the coefficient b can be computed without explicitly computing w.

Historical Background

The foundations of nonlinear optimization were developed in the eighteenth and nineteenth centuries in the study of the calculus of variations. The calculus of variations solves optimization problems whose parameters are not simple variables, but rather functions. For example, how should the shape of an automobile hood be chosen so as to minimize air resistance? Or, what path does a ray of light follow in an irregular medium? The calculus of variations is closely related to optimal control theory, where a set of “controls” is used to achieve a certain goal in an optimal way. For example, the pilot of an aircraft might wish to use the throttle and flaps to achieve a particular cruising altitude and velocity in a minimum amount of time or using a minimum amount of fuel. We are surrounded by devices designed using optimal control—in cars, elevators, heating systems, audio systems, etc. The calculus of variations was inspired by problems in mechanics, especially the study of three-dimensional motion. It was used to derive many important laws of physics. This was done using the principle of least action. Action is defined to be the integral of the product of mass, velocity, and distance. The principle of least action asserts that nature acts so as to minimize this integral. To apply the principle, the formula for the action integral would be specialized to the setting under study, and then the calculus of variations would be

i

i i

i

i

i

i

544

book 2008/10/23 page 544 i

Chapter 14. Optimality Conditions for Constrained Problems

used to optimize the integral. This general approach was used to derive important equations in mechanics, fluid dynamics, and other fields. The most famous problem in the calculus of variations was posed in 1696 by John Bernoulli. It is called the brachistochrone (“least time”) problem, and it asks that we find the shape of the curve down which a bead will slip from one point to another in the least time when accelerated only by gravity. The solution to the brachistochrone problem can be found by solving  t2 3 1 1 + x (t)2 dt, minimize √ x(t) x(t) 2g t1 where g is the gravitational constant. If this were a finite-dimensional problem, then it could be solved by setting the derivative of the objective function equal to zero, but seventeenthcentury mathematics did not know how to take a derivative with respect to a function. The brachistochrone problem was solved at the time by Newton and others, but the general techniques that inspired the name “calculus of variations” were not developed until several decades later. The first major results were obtained by Euler in the 1740s. He considered various problems of the general form 

t2

minimize x(t)

f (t, x(t), x (t))dt.

t1

The brachistochrone problem is of this form. Euler solved these problems by discretizing the solution x(t)—approximating the solution by its values at finitely many points. This gave a finite-dimensional problem that could be solved using the techniques of calculus. Euler then took the limit of the approximate solutions as the number of discretization points tended to infinity. This approach was effortful and restrictive because it had to be adapted to the specifics of the problem being solved, and because there were restrictions on the types of problems for which it was successful. Far more influential was the approach of Lagrange. He suggested that the solution be perturbed or “varied” from x(t) to x(t) + y(t), where  is a small number and y(t) is some arbitrary function that satisfies y(t1 ) = y(t2 ) = 0. For the brachistochrone problem this latter condition ensures that the perturbed function still represents a path between the two points. If x(t) is a solution to the problem 

t2

minimize x(t)

f (t, x(t), x (t))dt,

t1

then  = 0 will be a solution to 

t2

minimize 

f (t, x(t) + y(t), x (t) + y (t)) dt.

t1

This observation allowed Lagrange to convert the original infinite-dimensional problem to a one-dimensional problem that could be analyzed using ordinary calculus. Setting the

i

i i

i

i

i

i

14.9. Historical Background

book 2008/10/23 page 545 i

545

derivative of the integral with respect to  equal to zero at the point  = 0 leads to the equation ∂f d ∂f − = 0. dt ∂x ∂x This final condition is a first-order optimality condition for an unconstrained calculus-ofvariations problem. It was first discovered by Euler, but the derivation here is due to Lagrange. The name “calculus of variations” was chosen by Euler and was inspired by Lagrange’s approach in “varying” the function x(t). The optimality condition is stated as “the first variation must equal zero” by analogy with the condition f (x) = 0 for a one-variable optimization problem. Euler was so impressed with Lagrange’s work that he held back his own papers so that Lagrange could publish first, a magnanimous gesture by the renowned Euler towards the then young and unknown Lagrange. There are additional first-order optimality conditions for calculus-of-variations problems. The theory is more complicated than for finite-dimensional optimization, and the necessary and sufficient conditions for an optimal solution were not fully understood until the 1870s, when Weierstrass studied this topic. A discussion of this theory can be found in the book by Gregory and Lin (1992, reprinted 2007). Constraints can be added to problems in the calculus of variations just as in other optimization problems. A constraint might represent the principle of conservation of energy, or perhaps that the motion was restricted in some way, for example, that a planet was traveling in a particular orbit around the sun. Both Euler and Lagrange considered problems of this type, and both were led to the concept of a multiplier. In the calculus of variations the multiplier might be a scalar (as it is in finite-dimensional problems) or, depending on the form of the constraint, it might be a function of the independent variable t. They have come to be called “Lagrange multipliers” but, as with the optimality condition, Euler discovered them first. In his book Mécanique Analytique (1778), Lagrange includes an interpretation of the multiplier terms. He writes that they can be considered as representing the moments of forces acting on the moving particle, and serve to keep the constraints satisfied. This point of view is the basis for duality theory, although Lagrange does not seem to have followed up on this idea. Euler and Lagrange considered only problems with equality constraints, but later authors allowed inequality constraints as well. When specialized to finite-dimensional problems, the optimality condition is referred to as the Karush–Kuhn–Tucker condition. Kuhn and Tucker derived this result in a 1951 paper. It was later discovered that Karush had proven the same result in his Master’s thesis (1939) at the University of Chicago in the department headed by Bliss. We mention two aspects of his result: its treatment of inequality constraints, and the assumption or “constraint qualification” that was used to prove it. The first idea can be traced to Weierstrass and the second to Mayer, and both are outgrowths of the calculus of variations. (There are actually earlier examples of these results, due to Cauchy (1847a) and Gauss (1850–51), but these were isolated results and do not seem to have been influential.) In the 1870s Weierstrass studied the calculus of variations and presented lectures on the results of his investigations. Weierstrass did not publish his work, and it only became

i

i i

i

i

i

i

546

book 2008/10/23 page 546 i

Chapter 14. Optimality Conditions for Constrained Problems

widely known years later through the writings of those in attendance. According to the book by Bolza (1904, reprinted 2005), Weierstrass converted the inequality constraint g(x) ≤ 0 into an equivalent equality constraint g(x) + s 2 = 0 using a squared “slack” variable s. He then applied Lagrange’s results to obtain the optimality conditions (see the Exercises in Section 14.7). This technique is described in many sources dating from 1900 onward. Bolza later became a professor at the University of Chicago, establishing a connection between Weierstrass, Bliss, and Karush. Karush used this technique in his thesis. The constraint qualification used by Karush, Kuhn, and Tucker relates feasible arcs (paths of feasible points leading to the solution) to the gradients of the constraints at the solution. This same condition was used by Mayer in 1886, although applied to a calculusof-variations problem with equality constraints, and then in a chain of papers by various authors (including Bliss) leading to Karush’s thesis. In these papers it is called a “normality” condition, and it is equivalent to requiring that the matrix of constraint gradients at the solution be of full rank. The implicit function theorem (see Appendix B.9) can be used to relate this to the condition on feasible arcs, an observation that is explicit in Mayer’s work. Duality theory did not become fully developed until the early 20th century, with many of the important steps coming from the calculus of variations. At first there were only isolated examples of duality. That is, someone would notice that a pair of problems— one a maximization problem, one a minimization problem—would have optimal solutions that were related to each other. An early example of this type was published in 1755 and is described in the paper by Kuhn (1991). In the 19th century various other examples were noticed, such as the relationship between currents and voltages in an electrical circuit. Gradually it was understood that duality was not an accidental phenomenon peculiar to these examples, but rather a general principle that applied to wide classes of optimization problems. By the 1920s, techniques had been developed for obtaining upper and lower bounds on the solutions to optimization problems by finding approximate solutions to the primal and dual problems. Duality as a general idea is described in the book by Courant and Hilbert (1953, reprinted 1989); the same material can be found in the 1931 German edition of this book; however, it is not present in the 1924 edition, suggesting a date of origin in the late 1920s.

14.10

Notes

Optimality Conditions—In our previous development we saw that an optimal point for a nonlinearly constrained problem must satisfy the first-order optimality conditions, provided that this point is regular. Furthermore, an optimal point that is not regular may not satisfy the first-order optimality conditions. A condition such as regularity that guarantees that the first-order optimality conditions will be satisfied at an optimal point is called a constraint qualification. For example, the condition that T (x) = N (A(x)) for all feasible x is a

i

i i

i

i

i

i

14.10. Notes

book 2008/10/23 page 547 i

547

constraint qualification for the equality-constrained problem. Whenever it holds, an optimal point must satisfy the first-order optimality conditions. The regularity condition is also a constraint qualification, but stronger (that is, more restrictive) than the condition T (x) = N (A(x)) in the sense that any regular point will satisfy this condition. Unfortunately, the condition T (x) = N (A(x)) is not practical because it is not easy to verify. Regularity is easy to verify and therefore practical. The condition T (x) = N (A(x)) is not the weakest (that is, least restrictive) constraint qualification, in the sense that there are points that satisfy the first-order optimality conditions that do not satisfy this constraint qualification. One example is the problem minimize subject to

f (x) = x2 x2 = 0 x2 − x13 = 0.

At the solution x∗ = (0, 0)T there exists a vector of multipliers λ∗ such that ∇L(x∗ , λ∗ ) = 0, even though T (x) = N (A(x)). (See the Exercises.) Our comments here focus primarily on optimization problems with equality constraints. The constraint qualifications can be extended to problems that include inequality constraints as well. During the 1960s and early 1970s, much research was conducted to develop constraint qualifications that would guarantee the fulfillment of the optimality conditions; see, for example, Abadie (1967), Mangasarian (1969, reprinted 1994), and Gould and Tolle (1971). The constraint qualification developed by Guignard (1969) is the weakest in the sense that it is not only sufficient but also necessary for the fulfillment of the optimality conditions. Unfortunately it too is not practical for computation. Astronger but more useful constraint qualification for inequality-constrained problems is the Slater condition. It applies to a feasible set { x : gi (x) ≥ 0, i = 1, . . . , m } where the functions gi are concave. The condition states that, if S has a nonempty interior (that is, there is some point x0 satisfying gi (x0 ) > 0 for all i), then an optimal point must satisfy the first-order necessary condition. Duality—For more information on duality, see the books by Avriel (1976, reprinted 2003) and Rockafellar (1974). The use of the dual for creating nonlinear classifiers was proposed in 1992 by Boser et al. This work was built on the ideas of Aizerman et al. (1964) who first proposed the presentation of kernels as inner products in a feature space.

i

i i

i

i

book 2008/10/23 page 548 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 549 i

Chapter 15

Feasible-Point Methods

15.1

Introduction

In this chapter we examine methods that solve constrained optimization problems by attempting to remain feasible at every iteration. If all the constraints are linear, maintaining feasibility is straightforward. We discuss this case first. When nonlinear constraints are present, then more elaborate procedures are required. We discuss two such approaches to nonlinear constraints: sequential quadratic programming (SQP) and reduced-gradient methods. Both of these approaches generalize the techniques for linear constraints. Although they strive to maintain feasibility at every iteration, they do not always achieve this.

15.2

Linear Equality Constraints

The vast majority of methods for solving problems with linear equality constraints are feasible-point methods: they start from a feasible point and move along feasible descent directions to consecutively better feasible points. There are two features that make this approach particularly attractive. First, from a practical point of view it is advantageous that all iterates are feasible. Even if the algorithm fails to solve the problem to the accuracy desired, it might still provide a feasible solution that is usable. Second, by restricting movement to feasible directions, the equality-constrained problem is transformed into an unconstrained problem in the null space of the constraints. This new problem may then be solved using unconstrained minimization techniques. As in the previous chapter we write the problem in the form minimize subject to

f (x) Ax = b.

We assume that f is twice continuously differentiable, and that A is an m × n matrix of full row rank. As in the unconstrained case, the methods we describe are only guaranteed to find a stationary point of the problem. If the objective function is convex, this point will be a global minimizer of f . In the more general case, there is no guarantee that the point will be a global minimizer. In some cases it may not even be a local minimizer. 549

i

i i

i

i

i

i

550

book 2008/10/23 page 550 i

Chapter 15. Feasible-Point Methods

Let x¯ be a feasible point. Since any other feasible point can be reached from x¯ by moving in a feasible direction, the solution to the problem can be written as x∗ = x¯ + p, where p solves the problem minimize f (x¯ + p) n p∈

subject to Ap = 0. If Z denotes an n × (n − m) basis matrix for the null space of A, then p = Zv for some (n − m)-dimensional vector v. This problem is equivalent to the unconstrained problem minimize n−m v∈

φ(v) = f (x¯ + Zv).

We have reduced the problem of finding the “best” n-dimensional vector p to the unconstrained problem of finding the “best” (n − m)-dimensional vector v, that is, the v that minimizes the reduced function φ. Conceptually, it is possible to minimize the reduced function φ using any of the unconstrained methods described in Chapters 11–13. In practice it is not necessary to provide an explicit expression for φ(v). Instead, it is possible to work directly with the original variables x, using ∇φ(v) = Z T∇f (x)

and

∇ 2 φ(v) = Z T∇ 2 f (x)Z,

where x = x¯ + Zv. This idea will be demonstrated shortly. The basic tool for any solution method is the Taylor series. Expanding φ about zero (notice that φ(0) = f (x)), ¯ we obtain ¯ + 12 v TZ T∇ 2 f (x)Zv ¯ + ···. φ(v) = f (x¯ + Zv) = f (x) ¯ + v TZ T∇f (x) Ideally we would like to use the Newton direction; it is obtained by minimizing the quadratic approximation to φ(v) obtained from the Taylor series. Setting the gradient of the quadratic approximation to zero gives the following linear system in v: , + T 2 ¯ v = −Z T∇f (x). ¯ Z ∇ f (x)Z This system is known as the reduced Newton equation, or the null-space equation. Its solution may be written explicitly as −1 T  ¯ Z ∇f (x). ¯ v = − Z T∇ 2 f (x)Z This is an estimate of the “best” v; in turn it provides an estimate of the “best” p −1 T  ¯ Z ∇f (x). ¯ p = Zv = −Z Z T∇ 2 f (x)Z This direction is termed the reduced Newton direction at x. ¯ We can now derive the equality-constrained analog of the classical Newton method. The method sets xk+1 = xk + p, where p = −Z(Z T∇ 2 f (xk )Z)−1 Z T∇f (xk ) is the reduced Newton direction at xk . This is just the mathematical representation of the method, and in practice explicit inverses are not normally computed. The method does not require that the reduced function be formed explicitly.

i

i i

i

i

i

i

15.2. Linear Equality Constraints

book 2008/10/23 page 551 i

551

Example 15.1 (Reduced Newton Direction). Consider the problem f (x) = 12 x12 − 12 x32 + 4x1 x2 + 3x1 x3 − 2x2 x3 x1 − x2 − x3 = −1,

minimize subject to

and consider the feasible point x¯ = (1, 1, 1)T. Choose   1 1 Z= 1 0 0 1 as a basis for the null space of A = (1, −1, −1). The reduced gradient at x¯ is 8    10 1 1 0 T , Z ∇f (x) ¯ = 2 = 8 1 0 1 0 and the reduced Hessian matrix at x¯ is  Z ∇ f (x)Z ¯ = T

2

1 1

1 0

0 1

1 4 3

4 0 −2

3 −2 −1



1 1 0

1 0 1



 =

9 6

6 6

 .

The reduced Newton equation yields  v=

−2/3 −2/3

 ,

and hence the reduced Newton direction is  p = Zv =

−4/3 −2/3 −2/3

 .

Since the objective function is a quadratic and the reduced Hessian matrix is positive definite, a step length of α = 1 leads to the optimum x∗ = (− 13 , 13 , 13 )T. At x∗ , the reduced gradient is Z T∇f (x∗ ) = Z T(2, −2, −2)T = (0, 0)T as expected. The corresponding Lagrange multiplier (satisfying ∇f (x∗ ) = ATλ∗ ) is λ∗ = 2. The reduced Newton direction is invariant with respect to the null-space matrix Z: mathematically, any choice of basis matrix Z will yield the same search direction p (see the Exercises). Numerically, however, the choice of Z can have a dramatic effect on the computation. In fact, the condition number of Z T∇ 2 f (x)Z may be substantially larger than the condition number of ∇ 2 f (x). It can be shown that cond(Z T∇ 2 f (x)Z) ≤ cond(∇ 2 f (x)) × cond(Z TZ), and the upper bound on the right can sometimes be tight. Thus if the matrix Z TZ has a large condition number (this may happen, for example, if the columns of Z are “almost” linearly dependent), then the reduced Hessian matrix may have a condition number that is much larger than that of the Hessian matrix itself. For this reason it is advisable to select

i

i i

i

i

i

i

552

book 2008/10/23 page 552 i

Chapter 15. Feasible-Point Methods

Z so that the condition number of Z TZ is small. One such matrix is the orthogonal basis Z obtained from the QR factorization, which satisfies Z TZ = I (see Section 3.3.4). This choice guarantees that the reduced Hessian matrix has a condition number no larger than that of the Hessian matrix, and consequently it is a good choice for small dense problems. For large sparse problems the QR method may be too expensive or may give bases which are too dense to be practical. The classical reduced Newton method has all the properties of the classical Newton method. In particular, if the reduced Hessian matrix at the solution is positive definite, and if the starting point is sufficiently close to the solution, then the iterates will converge quadratically. In the more general case, however, the method may diverge or fail. To make the method reliable, some globalization strategy should be used (see Sections 11.5 and 11.6). Such strategies are essentially the same as in the unconstrained case. For example, we might use a line search to obtain a sufficient decrease in the objective value f and insist that the search direction produce sufficient descent. If xk is not a local solution and if the reduced Hessian matrix is positive definite, then the reduced Newton direction is a descent direction, since  −1 T pT∇f (xk ) = −∇f (xk )Z Z T∇ 2 f (xk )Z Z ∇f (xk ) < 0. If the reduced Hessian matrix is not positive definite, then the search direction may not be a descent direction and—worse still—may not even be defined. In this case, the modified factorizations described in Section 11.4 can be applied to the reduced Hessian matrix to provide a descent direction. (The reduced Hessian matrix will be positive definite in a neighborhood of a local solution point whenever this point satisfies the second-order sufficiency conditions.) Other compromises on Newton’s method may be made to obtain cheaper iterations. The simplest of all methods is of course the steepest-descent method. For the reduced function, this strategy gives the direction v = −Z T∇f (xk ) in the reduced space, which yields the reduced steepest-descent direction p = −ZZ T∇f (xk ) in the original space. Here the matrix Z may be any null-space matrix for A. Note, however, that the direction will vary with the particular choice of Z, unlike the reduced Newton direction. Example 15.2 (Reduced Steepest-Descent Direction). The reduced gradient at the initial point of Example 15.1 is Z T∇f (x) ¯ = (10, 8)T, and hence the reduced steepest-descent T ¯ = (−18, −10, −8)T. Had we chosen direction is p = −ZZ ∇f (x)   2 0 Zˆ = 1 4 1 −4 as the null-space matrix for A, the reduced gradient would be ¯ = Zˆ T(8, 2, 0)T = (18, 8)T, Zˆ T∇f (x)

i

i i

i

i

i

i

15.2. Linear Equality Constraints

book 2008/10/23 page 553 i

553

and the reduced steepest-descent direction would be p = −Zˆ Zˆ T∇f (x) ¯ = (−36, −50, 14)T. The reduced steepest-descent method has the same properties as that of its unconstrained counterpart. The iterations are cheap, but convergence may be very slow (see Section 12.2). Quasi-Newton methods are a more sophisticated compromise. A common approach is to construct an approximation Bk to the reduced Hessian matrix at xk . Let Z be a basis for the null space of A. The search direction is computed as p = Zv, where v is obtained by solving Bk v = −Z T∇f (xk ). The approximation Bk is updated in much the same way as in the unconstrained case, except that all quantities are in the reduced space. For example, the symmetric rank-one update formula becomes (y¯k − Bk s¯k )(y¯k − Bk s¯k )T Bk+1 = Bk + , (y¯k − Bk s¯k )Ts¯k where y¯k = Z T (∇f (xk+1 ) − ∇f (xk )) and s¯k = Z T(xk+1 − xk ). For large problems, “reduced” versions of the low-storage methods in Chapter 13 may be suitable. For example, a truncated-Newton method or limited-memory quasi-Newton methods could be used. If the matrix A is sparse, a null-space matrix Z that preserves sparsity should be chosen. In principle, it is possible to solve an equality-constrained problem using any standard technique for unconstrained optimization. In practice, the numerical difficulties encountered when solving equality-constrained problems are not quite the same as those encountered when solving unconstrained problems, and it is not always possible to solve a large equalityconstrained problem by simply applying general-purpose software for unconstrained optimization. One reason is that the reduced Hessian matrix in a constrained problem is often different in structure from the Hessian matrix in an unconstrained minimization problem. This is demonstrated in the following example. Example 15.3 (Special Structure of Matrix Destroyed by Reduction). Consider the quadratic problem minimize f (x) = 12 x12 + x22 + 2x32 + 4x42 subject to

x1 + x2 + x3 + x4 = 1.

Taking the matrix

⎛ Z=

1 2 ⎜ 1 ⎜ 2 ⎜ 1 ⎝ −2 − 12

1 2 − 12 1 2 − 12

1 2 − 12 − 12 1 2

⎞ ⎟ ⎟ ⎟ ⎠

as a basis for the null space of the constraint matrix A = (1, 1, 1, 1), we obtain ⎞ ⎛ ⎛ 15 ⎞ 3 1 0 0 0 − 54 4 4 ⎟ ⎜0 2 0 0⎟ ⎜ T 2 15 ∇ 2 f (x) = ⎝ − 94 ⎠ . ⎠ and Z ∇ f (x)Z = ⎝ 43 4 0 0 4 0 15 − 54 − 94 0 0 0 8 4

i

i i

i

i

i

i

554

book 2008/10/23 page 554 i

Chapter 15. Feasible-Point Methods

Thus the reduced matrix Z T∇ 2 f (x)Z is dense, even though the matrix ∇ 2 f (x) is sparse. The special diagonal structure of the Hessian matrix is destroyed by the reduction. To overcome these problems, special implementations that are tailored to the equalityconstrained problem may be needed. For example, if a conjugate-gradient method is used to solve the reduced Newton equation (as in a truncated-Newton method), then it is not necessary to form the reduced Hessian matrix explicitly. The reason is that the conjugategradient method requires only Hessian-vector products—in this case, products of the form (Z T∇ 2 f (xk )Z)y for some vector y. This can be done by first computing y1 = Zy, then computing y2 = ∇ 2 f (xk )y1 , and finally by computing the required Hessian-vector product as y3 = Z Ty2 . If ∇ 2 f is sparse, and Z can be represented in sparse form, then for large problems such techniques may bring substantial computational savings. Once an optimal solution to the equality-constrained problem is obtained, the associated vector of Lagrange multipliers is computed. There are several reasons for this. First, the Lagrange multipliers measure the sensitivity of the solution to changes in the constraints. Second, the equality-constrained problem could be one of a sequence of problems generated by an algorithm for solving a problem with inequality constraints (see Section 15.4). In this case, the Lagrange multipliers indicate how to improve the current solution. Computation of the Lagrange multipliers should be done in a cost-effective manner. We discuss this issue in more detail in the next section. As was mentioned in the last chapter, the optimality conditions for minimize

f (x)

subject to

Ax = b

can be used directly to derive algorithms. The conditions are ∇f (x) − ATλ = 0 b − Ax = 0, where λ is the vector of Lagrange multipliers. This is a system of nonlinear equations in the variables x and λ. If Newton’s method is applied to this system, then xk+1 = xk + pk λk+1 = λk + νk , where the updates pk and νk are the solution to the Newton equations    T   2 A λk − ∇f (xk ) p ∇ f (xk ) −AT = . ν Axk − b −A 0 (See the Exercises.) Some algorithms for constrained optimization work directly with this linear system, although some care must be taken to ensure that descent directions are obtained. This linear system is closely related to the reduced Newton equation derived earlier. If xk is feasible, then b − Axk = 0, and p must satisfy Ap = 0. Hence p = Zv for some (n − m)-dimensional vector v. If we substitute for p in the first equation of our system, then ∇ 2 f (xk )Zv − ATν = ATλk − ∇f (xk ).

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 555 i

555

Multiplying this equation on the left by Z T, and using the fact that Z TAT = 0, we obtain [Z T∇ 2 f (xk )Z]v = −Z T∇f (xk ), the reduced Newton equation. Thus we can interpret the reduced Newton equation as a technique for applying Newton’s method to the optimality conditions for the constrained optimization problem. There is yet another way to compute the Newton direction. The derivation is based on the Newton equations, and it assumes that ∇ 2 f (x) is positive definite for all x. Suppose that xk is feasible so that Axk − b = 0, and let λk+1 = λk + ν. If we write ∇ 2 f = ∇ 2 f (xk ) and ∇f = ∇f (xk ), then the Newton equations are equivalent to    2   p ∇ f −AT −∇f . = λk+1 0 −A 0 From the first equation we obtain p = (∇ 2 f )−1 ATλk+1 − (∇ 2 f )−1 ∇f. Since Ap = 0,

0 = Ap = A(∇ 2 f )−1 ATλk+1 − A(∇ 2 f )−1 ∇f.

This equation can be used to solve for λk+1 : λk+1 = [A(∇ 2 f )−1 AT]−1 A(∇ 2 f )−1 ∇f. Substituting this into the equation for p gives   p = − (∇ 2 f )−1 − (∇ 2 f )−1 AT[A(∇ 2 f )−1 AT]−1 A(∇ 2 f )−1 ∇f. This is sometimes called the projected Newton direction.

Exercises 2.1. Use a reduced Newton method to solve the problem minimize subject to where

f (x) = 12 x TQx Ax = b,



⎞ 0 −13 −6 −3 23 −9 3⎟ ⎜ −13 Q=⎝ ⎠, −6 −9 −12 1 −3 3 1 −1     3 2 1 2 1 . , and b = A= 2 1 1 3 −1

Initialize the method with x0 = (1, 1, 0, 0)T.

i

i i

i

i

i

i

556

book 2008/10/23 page 556 i

Chapter 15. Feasible-Point Methods

2.2. Use a reduced steepest-descent method to solve the problem above, starting from x0 = (1, 1, 0, 0)T. Perform three iterations, using an exact line search. 2.3. Prove that the reduced steepest-descent direction is a descent direction at any point that is not a stationary point. 2.4. The particular variant of the reduced steepest-descent method, in which the nullspace matrix for the constraints Ax = b is the orthogonal projection matrix, is called the projected gradient method. Derive an explicit expression for the search direction at each iteration of the projected gradient method. 2.5. Let Z1 and Z2 be two basis matrices for the null space of a full row rank m × n matrix A. Let H be a matrix such that Z1TH Z1 is positive definite. Prove that the matrix Z2TH Z2 is also positive definite, and that Z1 (Z1TH Z1 )−1 Z1T = Z2 (Z2TH Z2 )−1 Z2T. 2.6. Let H be the three-dimensional identity matrix, and let A = (2, 1, 1). Compute a basis matrix Z for the null space of A for which (a) cond(Z TH Z) = 1, and (b) cond(Z TH Z) > 1000. 2.7. Derive the formula for the reduced version of the symmetric rank-one update. 2.8. Derive a reduced version of the BFGS update formula. 2.9. Apply Newton’s method to the first-order optimality condition for minimize subject to

f (x) Ax = b.

Show that the iteration has the form xk+1 = xk + pk λk+1 = λk + νk , where the updates pk and νk form the solution to    T   2 A λk − ∇f (xk ) p ∇ f (xk ) −AT = . ν Axk − b −A 0 Under what conditions on ∇ 2 f (x) and A will this iteration have a quadratic convergence rate? Under what conditions on ∇ 2 f (x) and A will pk be a descent direction for f at xk ? 2.10. Let Z be a null-space matrix, and assume that ∇ 2 f (x) is positive definite. Prove that cond(Z T∇ 2 f (x)Z) ≤ cond(∇ 2 f (x)) × cond(Z TZ).

15.3

Computing the Lagrange Multipliers

Consider the linear equality-constrained problem minimize

f (x)

subject to

Ax = b.

i

i i

i

i

i

i

15.3. Computing the Lagrange Multipliers

book 2008/10/23 page 557 i

557

Assume that the regularity condition holds, that is, that the rows of A are linearly independent. Consider the optimality condition ATλ∗ = ∇f (x∗ ). This is a system of n equations in m ≤ n unknowns, and so it cannot normally be expected to have a solution. At most feasible points x∗ , this overdetermined system will be inconsistent, but if x∗ is a local solution of the optimization problem, then the system will have a solution. How can such a solution λ∗ be computed? A useful tool is a matrix known as the right inverse. We define an n × m matrix Ar to be a right inverse for the m × n matrix A, if AAr = Im . It is easy to see that a matrix A has a right inverse only if it has full row rank. In this case, and if m = n, then the right inverse is unique, and Ar = A−1 . If m < n, the right inverse is generally not unique. For example, the matrices ⎞ ⎛ 3 ⎛ ⎞ 0 4 1 0 ⎜ −1 0 ⎟ ⎟ ⎜0 0⎟ ⎜ 4 ⎟ and ⎝ ⎜ ⎠ 0 1 ⎝ 0 12 ⎠ 0 0 0 1 2

are both right inverses for the matrix  A=

1 0

−1 0

0 1

0 1

 .

To see how right inverses are of use in solving the system ATλ∗ = ∇f (x∗ ), suppose that a solution to this system exists. If both sides of this equation are multiplied by ATr, then we obtain λ∗ = ATr∇f (x∗ ). (Here ATr refers to (Ar )T and not (AT)r .) If the system ATλ∗ = ∇f (x∗ ) is consistent, its solution λ∗ = ATr∇f (x∗ ) is unique, even though the right inverse may not be unique. To verify this, note that ATλ∗ = ∇f (x∗ ) implies that AATλ∗ = A∇f (x∗ ), and so the unique solution is λ∗ = (AAT)−1 A∇f (x∗ ). (If A has full row rank, the matrix AAT is positive definite, and hence its inverse exists.) The linear system ATλ∗ = ∇f (x∗ ) is consistent if and only if ∇f (x∗ ) is a linear combination of the rows of A. Hence a vector λ∗ computed via λ∗ = ATr∇f (x∗ ) will be a solution to the system if and only if (I − ATATr)∇f (x∗ ) = 0 (see the Exercises). In practice we will almost never find a point x∗ that satisfies the optimality conditions precisely. Rather, we will (if successful) find some point xk that satisfies the optimality conditions to within some specified tolerance. The point xk will be an estimate of the optimal solution. Correspondingly, the vector λ = ATr∇f (xk ) will be only an estimate of the vector of Lagrange multipliers at the solution. It is sometimes termed a first-order estimate, because, for sufficiently small , if xk − x∗  = O(), then λ − λ∗  = O() also.

i

i i

i

i

i

i

558

book 2008/10/23 page 558 i

Chapter 15. Feasible-Point Methods

In the rest of this section, we discuss methods for computing a right-inverse matrix. To avoid unnecessary work, the computation of a right-inverse matrix for a matrix A should be performed in conjunction with the computation of the null-space matrix for A. We will show that each of the methods for computing a null-space matrix for A (see Section 3.3) provides a right-inverse matrix at little or no additional cost. The discussion assumes that A is an m × n matrix of full row rank. • The variable reduction method (see Section 3.3.1). In this method the variables are partitioned into m basic and n − m nonbasic variables. The matrix A is partitioned into basic and nonbasic columns correspondingly. Assuming that the first m columns are basic, we have A = (B, N ) where B is an m × m nonsingular matrix, and the n × (n − m) matrix   −B −1 N Z= I is a basis matrix for the null space of A. The matrix  −1  B Ar = 0 is a right-inverse matrix for A that is available with no additional computation. • Orthogonal projection matrix (see Section 3.3.2). Let the n × n matrix P = I − AT(AAT)−1 A be the orthogonal projection matrix into the null space of A. A right inverse for A associated with the orthogonal projection is the matrix Ar = AT(AAT)−1 . This matrix, which we will denote by A+ , is a special right inverse. It satisfies the following four conditions: AA+ A = A, A+ AA+ = A+ ,

(AA+ )T = AA+ , (A+ A)T = A+ A.

It can be shown that, for any m × n matrix A, there is a unique n × m matrix A+ that satisfies these conditions. A+ is called the Penrose–Moore generalized inverse of A. If A has full row rank, then A+ = AT(AAT)−1 , and if A has full column rank, then A+ = (ATA)−1 AT. Formulas for A+ can also be developed when A does not have full row or column rank; see the book by Golub and Van Loan (1996). Given a point xk , the vector of Lagrange multiplier estimates (A+ )T∇f (xk ) obtained from the Penrose–Moore generalized inverse has the appealing property that it solves the problem   minimize ATλ − ∇f (xk ) λ∈m

2

(see the Exercises). For this reason it is termed the least-squares Lagrange multiplier estimate at xk .

i

i i

i

i

i

i

15.3. Computing the Lagrange Multipliers

book 2008/10/23 page 559 i

559

Because the condition number of AAT is the square of the condition number of A, the computation of (AAT)−1 is potentially unstable. The QR factorization provides a stable approach to computing this matrix that is practical for smaller problems (see below). • A nonorthogonal projection (see Section 3.3.3). Let D be a positive-definite n × n matrix. Then the n × n projection matrix PD = I − DAT(ADAT)−1 A is a null-space matrix for A. A right inverse for A associated with this projection is Ar = DAT(ADAT)−1 . • The QR factorization (see Section 3.3.4). The QR factorization represents AT as a product of an orthogonal matrix Q and an upper triangular matrix R. Denoting the first m columns of Q by Q1 and the last n − m columns by Q2 , we have   R1 , AT = QR = ( Q1 Q2 ) 0 where R1 is an m × m triangular matrix. The n × (n − m) matrix Z = Q2 is an orthogonal basis for the null space of A. The matrix Ar = Q1 R1−T is a right inverse for A available from the QR factorization at little additional cost. In fact, this matrix need not be formed explicitly: a computation of the form λ = ATr∇f (xk ) may be done by first computing y1 = QT1 ∇f (xk ) and then solving the triangular system R1 λ = y1 . It is easy to show that Ar = AT(AAT)−1 , and hence this right inverse is in fact the Penrose–Moore generalized inverse of A (see the Exercises). Just as with the “regular” matrix inverse, a right inverse is a useful notational tool, but it should rarely be formed explicitly. Instead, computations with respect to the right inverse should use the specific matrix factorizations that were employed to obtain the null-space matrix. Example 15.4 (Right Inverses). We will construct several right inverses for   1 −1 0 0 . A= 0 0 1 1 If variable reduction is used, with columns 2 and 3 of A being selected as the basic columns, then     1 0 −1 0 . and N = B= 0 1 0 1

i

i i

i

i

i

i

560

book 2008/10/23 page 560 i

Chapter 15. Feasible-Point Methods

From these we determine that ⎛

1 ⎜1 Z=⎝ 0 0

⎞ 0 0⎟ ⎠ −1 1



and

⎞ 0 0⎟ ⎠. 1 0

0 −1 ⎜ Ar = ⎝ 0 0

(For all the right inverses that we compute in this example, it is straightforward to verify that AZ = 0 and AAr = I .) If the orthogonal projection matrix is used, then ⎛1 1 0 0⎞ 2

2 1 2

⎜1 ⎜ P = I − AT(AAT)−1 A = ⎜ 2 ⎝0

0

0

0

The corresponding right inverse is

1 2 − 12

1 2 ⎜ −1 ⎜ 2

Ar = AT(AAT)−1 = ⎜ ⎝ 0

1 2

0

then

1 2

0⎞ 0⎟ ⎟ ⎟. 1 ⎠ 2



A nonorthogonal projection can also be used. ⎛ 1 0 0 ⎜0 2 0 D=⎝ 0 0 3 0 0 0

0⎟ ⎟ ⎟. − 12 ⎠

0

If

⎞ 0 0⎟ ⎠, 0 4

⎛2

0

⎜ ⎜ PD = I − DAT(ADAT)−1 A = ⎜ ⎝0

1 3 1 3

0

0

0

4 7 − 47

3 2 3

The corresponding right inverse is



1 3 ⎜ −2 ⎜ 3

Ar = DAT(ADAT)−1 = ⎜ ⎝ 0 0 If a QR factorization of AT is used, then ⎛ − √1 0 −1 −1 ⎞ ⎜ ⎜ Q=⎜ ⎜ ⎝

2 1 √ 2

2

0

− 12

0

− √12

1 2

0

− √12

− 12

2

⎟ ⎟ ⎟ 1 ⎟ −2 ⎠ − 12

1 2

and

0

0⎞ 0⎟ ⎟ ⎟. 3 ⎠ −7 3 7

0⎞ 0⎟ ⎟ ⎟. 3 ⎠ 7 4 7

⎛ √ − 2 ⎜ 0 R=⎝ 0 0

0 √



− 2⎟ ⎠. 0 0

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 561 i

561

Z consists of the last two columns of Q: ⎛ −1 Z=

− 12 ⎞ − 12 ⎟ ⎟ ⎟. 1 ⎠ −2

2 ⎜ −1 ⎜ 2 ⎜ 1 ⎝ 2 − 12

1 2

The right inverse is obtained from the formula Ar = Q1 R1−T , where Q1 consists of the first two columns of Q,

0

0 ⎞ 0 ⎟ ⎟ ⎟ ⎟ 1 − √2 ⎠

0

− √12

⎛ − √1 ⎜ ⎜ Q1 = ⎜ ⎜ ⎝

2 √1 2

and R1 consists of the first two rows of R,  √ − 2 R1 = 0 Hence

0 √



− 2



1 2 ⎜ −1 ⎜ 2

Ar = ⎜ ⎝ 0 0

.

0⎞ 0⎟ ⎟ ⎟. 1 ⎠ 2 1 2

If ∇f (x) = ( 7

−7

−2

−2 )T ,





then for all of the above right inverses, λ = ATr∇f (x) =

7 −2

.

No matter which right inverse is used, the same values of the Lagrange multipliers are obtained.

Exercises 3.1. Compute four different right inverses for the matrix A = (1, 4, −2). Demonstrate that each of the right inverses yields the same solution when used to solve the system ATλ = (−3, −12, 6)T.

i

i i

i

i

i

i

562

book 2008/10/23 page 562 i

Chapter 15. Feasible-Point Methods

3.2. Use the variable reduction method to find a right inverse for the matrix   2 −1 4 6 , A= 1 −1 7 −5 where the basis consists of the second and third variables, i.e., xB = (x2 , x3 )T. Use your computations to solve the system ATλ = (3, −1, 1, 17)T. 3.3. Consider the system ATλ = ∇f (x∗ ), where A is a matrix with full row rank. Let Ar be a right inverse matrix for A. Prove that the system has a solution if and only if (I − ATATr)∇f (x∗ ) = 0. 3.4. Consider the equality-constrained problem minimize subject to

f (x) Ax = b.

Let x∗ be a local solution to the problem with associated Lagrange multiplier vector λ∗ . Assume that A has full row rank, and let Ar be a right inverse for a matrix A. Prove that x∗ + Ar δ is a feasible solution to the perturbed constraints Ax = b + δ. Confirm that a first-order approximation to the objective function at this point is f (x∗ ) + δ Tλ∗ . 3.5. Let A be an m × n matrix of full row rank. (i) Prove that AT(AAT)−1 satisfies the four conditions for a Penrose–Moore generalized inverse. (ii) Prove that if m = n, then A+ = A−1 . 3.6. Let A be an m × n matrix of full column rank. Prove that (ATA)−1 AT satisfies the four conditions for a Penrose–Moore generalized inverse. 3.7. Let A be an m × n matrix of full row rank, and let P be the projection matrix associated with N (A). Prove that P + = P . 3.8. Let A be an m × n matrix of full row rank. Prove that λ¯ = (AAT)−1 A∇f (xk ) solves the least-squares problem  T  A λ − ∇f (xk ) . minimize 2 m λ∈

3.9. Let A be a full row rank matrix, and let Ar be a right inverse for A. Prove that the matrix P = I − Ar A is a projection matrix. 3.10. Let Ar = Q1 R1−T be the right-inverse matrix for A obtained from the QR factorization of AT. Prove that Ar = AT(AAT)−1 . 3.11. Write a computer program that solves minimize subject to

f (x) = 12 x TQx − cTx Ax = b,

where Q is positive definite and A is an m × n matrix of full row rank. Use a reduced Newton direction with a step size of 1. Assume that a feasible starting point

i

i i

i

i

i

i

15.4. Linear Inequality Constraints

book 2008/10/23 page 563 i

563

is available. Use your program to solve the problem with  A=

1 0 1

c = ( −7

2 1 0

1 0 2

2 0 1

3 −3

0 −1 1





−8

,

2 ⎜ −1 ⎜ Q=⎜ ⎝ −2 )T ,

and



−1 2 1

⎟ ⎟ ⎟, ⎠

1 −1 −1 1 x0 = ( 0 1 1 1

  5 b= 1 , 3

0 )T .

Print out the optimal solution and the associated Lagrange multipliers.

15.4

Linear Inequality Constraints

In this section we discuss methods for solving problems with linear inequality constraints. The problem will be written in the form minimize

f (x)

subject to

Ax ≥ b,

where f is a twice continuously differentiable function. For simplicity we assume that the problem has only inequality constraints. The extension of the methods to include equality constraints is straightforward and will be mentioned at the end of the section. Suppose that the point x∗ is a local solution to this problem. Let Aˆ be a matrix whose ˆ rows are the coefficients of the active constraints at x∗ , and let Z be a null-space matrix forA. T The first-order optimality conditions state that there exists λ∗ ≥ 0 such that ∇f (x∗ ) = Aˆ λ∗ (or equivalently, Z T∇f (x∗ ) = 0). Problems that have inequality constraints are significantly more difficult to solve than problems in which all constraints are equations. The reason is that it is not known in advance which inequality constraints are active at the solution. If we knew a priori the correct active set, then we could ignore the inactive constraints and minimize the objective function with all active constraints treated as equalities. In practice, unfortunately, we do not know what the correct active set is. How can we resolve this combinatorial issue? A brute force approach would be to solve the equality-constrained problem for all possible selections of active constraints, and then choose the best solution. Even for a small problem, however, the number of such subproblems is enormous, and the amount of work could be prohibitive. Active-set methods attempt to overcome this difficulty by moving sequentially from one choice of active constraints to another choice that is guaranteed to produce at least as good a solution. The hope is that only a fraction of the potential subproblems will be considered. The most commonly used active-set methods are feasible-point methods. An initial feasible point, if none is provided, can be obtained much as in linear programming (see Section 5.5). At each iteration of the active-set method, we select a working set of constraints that are assumed to be active at the optimum. We attempt to minimize f with all constraints in the working set treated as equalities. All other constraints are considered inactive and

i

i i

i

i

i

i

564

book 2008/10/23 page 564 i

Chapter 15. Feasible-Point Methods

temporarily ignored. (We should keep in mind, however, that these constraints should not be violated—more on that later.) In general, the working set at the current point x is a subset of the constraints that are active at x, so that x is a feasible point for the working set. There may also be constraints that are active at x but that are not included in the working set; hence the working set is not necessarily equal to the active set. Example 15.5 (Working Set). Consider the problem minimize subject to

f (x) x 1 + x2 + x3 x1 x2 x3

≥1 ≥0 ≥0 ≥ 0.

At xa = (0, 12 , 12 )T the first two inequalities are active. If both constraints are chosen for the working set, then we will attempt to minimize f on the set { x : x1 + x2 + x3 = 1, x1 = 0 } . If only the first constraint is selected to be in the working set, then we will attempt to minimize f on the set { x : x1 + x2 + x3 = 1 } . The problem of minimizing f subject to the constraints defined by the working set is an equality-constrained problem. Therefore we can use any of the techniques described in Section 15.2 to obtain a feasible search direction p. We could then use this search direction within a line search method and find an appropriate step length α. If this were truly an equality-constrained problem, we could use a standard line search method for unconstrained minimization and take a step considered to be “acceptable” by the line search. For example, we could test an initial step length of one, and use backtracking to find a step that satisfies a sufficient decrease condition (see Section 11.5). In a problem with inequality constraints, however, an “acceptable” step might lead to a point that is infeasible, that is, a point that violates one or more of the constraints that we have ignored. Geometrically, as we move from x along p, we may encounter the boundary of some constraint for some step length α. ¯ The value α¯ represents the largest possible step that may be taken without violating feasibility. The line search procedure must place an upper bound α¯ on any trial step, and the step length must never exceed α. ¯ It is possible that the “best” acceptable step length that does not exceed α¯ is α¯ itself. This step leads to a point on the boundary of a constraint. The constraint encountered is now satisfied exactly at the new point, and it is added to the working set. With the step length determined, and any necessary adjustments made to the working set, the entire process is repeated. It is also possible that the “best” acceptable step length is zero. This is an exceptional case, and it occurs when α¯ = 0. If α¯ = 0 occurs, no step is taken, and a constraint is added to the working set (since α = α¯ = 0).

i

i i

i

i

i

i

15.4. Linear Inequality Constraints

book 2008/10/23 page 565 i

565

x3

1

A

B

D C E x2

0 1 1 x1

Figure 15.1. Sequence of movements in an active-set method. Suppose now that we have found a point x that minimizes f on a given working set. Then the first-order optimality conditions for the equality-constrained problem are satisfied at x, and we can compute the Lagrange multipliers corresponding to the constraints in the working set. (The Lagrange multipliers for all other constraints are assumed to be zero.) If the Lagrange multipliers are all nonnegative, then x is also a solution to the original inequality-constrained problem and the problem is solved. However, if some Lagrange multiplier is negative, then x is not an optimal solution. The negative multiplier indicates that the function can be decreased if we move away from the corresponding constraint into the interior of the feasible region. Hence we can drop this constraint from the working set. We now have a new working set, and the process is repeated. (For simplicity, we allow only one constraint at a time to enter or leave the working set, although alternatives are possible.) In summary, active-set methods have two major components. One component is the selection of the search direction. For a given working set, it is a feasible descent direction for the equality-constrained problem associated with the working set. The other component is a strategy for changing the working set. A constraint may be added to the working set if it is encountered in the course of a line search; a constraint may be dropped from the working set at an optimal point of the equality-constrained problem if its corresponding Lagrange multiplier is negative. Example 15.6 (Sequence of Movements in an Active-Set Method). Figure 15.1 illustrates a possible sequence of movements in an active-set method for minimizing a convex function f on the box 0 ≤ xi ≤ 1, i = 1, 2, 3. The directions of movement in this example are arbitrary feasible descent directions and do not correspond to any specific method. Let the point A be the starting point. The initial working set is chosen as the active constraints at A. It consists of the upper bound constraint on x3 , which is the single constraint that is active at A. An attempt is now made to minimize f subject to x3 = 1, starting from A. Suppose that the first search ends at the point B. If B is still not a minimizer of f on x3 = 1, then another search is made, starting from B. Suppose that this time the boundary of the constraint x1 ≤ 1 is encountered at the point C. Then C is accepted as the new solution, and the upper bound constraint on x1 is added to the working set. If the point C is not a minimizer of f on the set x3 = 1 and x1 = 1, then a search is made on this constraint set. Suppose that a constraint boundary is encountered at the point D = (1, 1, 1)T. Then

i

i i

i

i

i

i

566

book 2008/10/23 page 566 i

Chapter 15. Feasible-Point Methods

the constraint x2 = 1 is added to the working set. There are now three constraints in the working set: x3 = 1, x2 = 1, and x1 = 1. Thus the point D is the only feasible solution to these constraints, and D is trivially a local minimizer of f on these constraints. The Lagrange multipliers corresponding to the three constraints are now computed. Suppose that the Lagrange multiplier corresponding to the constraint x3 = 1 is negative, so f can be improved by decreasing x3 . After removing the constraint x3 = 1, the working set consists of the constraints x2 = 1 and x1 = 1. A search along these constraints leads to, say, the point E. Assume that E is a local minimizer of f along these two constraints. If the Lagrange multipliers corresponding to these constraints are both nonnegative, then E is also a local minimizer for the original problem, and the algorithm is terminated. We now discuss some of the above ideas in further detail. We assume that we have a point x that is feasible for the inequality-constrained problem. Denote the working set at x by W; that is, W is the set of indices of the constraints in the working set. Denote the coefficient matrix for the constraints in the working set by A¯ and the corresponding ¯ Let Z¯ be a null-space matrix for A. ¯ The equality-constrained right-hand-side vector by b. problem for the working set W can be written in the form minimize

f (x) ¯ = b. ¯ subject to Ax This problem is commonly solved using some feasible direction method. Thus, if p is the ¯ = 0. The step-size procedure will attempt to find an search direction at x, p satisfies Ap acceptable step length, while retaining feasibility with respect to all the constraints. It is easy to compute the maximum feasible step length that can be taken along a direction p using a ratio test (see Section 3.1): α¯ = max { α : x + αp is feasible } = min (aiTx − bi )/(−aiTp) : aiTp < 0,

i ∈ W .

We now outline a simple active-set method. Assume that a feasible starting point x0 is given and let W be the index set of the active constraints at x0 . Let A¯ be the constraint ¯ and let A¯ r be a right matrix for the active constraints, let Z¯ be a null-space matrix for A, ¯ Set k = 0. inverse for A. 1. The Optimality Test—If Z¯ T∇f (xk ) = 0, then (i) If no constraints are active, then the current point is a local (unconstrained) stationary point—stop. (ii) Else, compute Lagrange multipliers: T λ¯ = A¯ r ∇f (xk ).

(iii) If λ¯ ≥ 0, then stop (a local stationary point has been reached). Otherwise, drop a constraint corresponding to a negative multiplier from the active set, and ¯ Z, ¯ and A¯ r . update W, A, 2. The Search Direction—Compute a descent direction p that is feasible with respect to the constraints in the working set.

i

i i

i

i

i

i

15.4. Linear Inequality Constraints

book 2008/10/23 page 567 i

567

3. The Step—Compute a step length satisfying f (xk + αp) < f (xk ) and α ≤ α¯ where α¯ is the maximum feasible step along p. 4. The Update—Find the new solution point xk+1 = xk + αp. If a new constraint boundary is encountered (α = α), ¯ add it to the working set ¯ Z, and A¯ r accordingly. (If more than one constraint boundary and update W, A, is encountered, then pick one of the constraints to enter the working set; this is a degenerate case.) Set k = k + 1 and return to 1. Example 15.7 (Active-Set Method). Consider the problem minimize f (x) = 12 (x1 − 3)2 + (x2 − 2)2 subject to 2x1 − x2 ≥ 0 −x1 − x2 ≥ −4 x2 ≥ 0. We use an active-set method to solve this problem. The equality-constrained subproblems will be solved using a reduced Newton method. Since the objective function is quadratic, we use a step α = 1 whenever it is feasible, that is, whenever α¯ ≥ 1. Otherwise, we shall take the step α = α. ¯ We use the variable reduction method to compute the null-space matrix for the active constraints, and for simplicity always use the “left-hand” submatrix of A¯ as the basis matrix. This gives A¯ = ( B

N ),

Z¯ =



−B −1 N I



, A¯ r =



B −1 0

 .

Let x0 = (0, 0)T be our feasible starting point. Since the first and third constraints are active, we have     1/2 1/2 2 −1 ¯ ¯ . , Ar = A= 0 1 0 1 The basis matrix Z¯ is empty, and hence the reduced gradient Z¯ T∇f (x0 ) vanishes trivially. We therefore compute the Lagrange multipliers        T −3/2 −3 λ1 1/2 0 . = λ¯ = = A¯ r ∇f (x0 ) = −11/2 −4 1/2 1 λ3 Both multipliers are negative, and thus we should drop one of the constraints from the working set. We drop the third constraint because its multiplier is more negative. Updating the working set gives     1/2 1/2 , A¯r = A¯ = ( 2 −1 ) , Z¯ = , 1 0

i

i i

i

i

i

i

568

book 2008/10/23 page 568 i

Chapter 15. Feasible-Point Methods

so that the new reduced gradient is Z¯ T∇f (x0 ) = (−11/2). We now compute the reduced Newton search direction to obtain     ¯ Z¯ T∇ 2 f (x0 )Z) ¯ −1 Z¯ T∇f (x0 ) = − 1/2 (9/4)−1 (−11/2) = 11/9 . p = −Z( 1 22/9 The maximum step to the boundary of the constraints is α¯ = 12/11, and hence a step length of 1 is feasible (α = 1). The full Newton step is taken to reach the point       11/9 11/9 0 . = x1 = +1 22/9 22/9 0 The next iteration begins with the optimality test:   −16/9 T ¯ Z ∇f (x1 ) = ( 1/2 1 ) = (0). 8/9 Thus the reduced gradient vanishes at x1 , as expected. Since a local minimum of f with respect to the working set has been found, we compute the Lagrange multiplier corresponding to the active constraint:   ¯λ = ( λ1 ) = A¯ Tr∇f (x1 ) = ( 1/2 0 ) −16/9 = (−8/9). 8/9 As this multiplier is negative, we drop the constraint from the active set. We are now left with no active constraints, which means that the problem is locally unconstrained. The reduced gradient is simply the gradient itself (Z¯ = I ), and the search direction is simply the unconstrained Newton direction      16/9 −16/9 1 0 . = p = −∇ 2 f (x1 )−1 ∇f (x1 ) = − −4/9 8/9 0 1/2 Since the largest feasible step to the boundary is α¯ = min { 1/4, 11/2 } = 1/4, we use α = 1/4, and at the new point       5/3 16/9 11/9 x2 = , = + (1/4) 7/3 −4/9 22/9 the second constraint is active. We now update   −1 ¯ ¯ , A = ( −1 −1 ) , Z = 1

A¯r =



−1 0

 .

Again testing for optimality, we find that the reduced gradient at the new point is   −4/3 Z¯ T∇f (x2 ) = ( −1 1 ) = (2). 2/3

i

i i

i

i

i

i

15.4. Linear Inequality Constraints

book 2008/10/23 page 569 i

569

4

3

x1

x2 x3

2

1

x0 1

3

2

4

Figure 15.2. Illustration of active-set algorithm. Since it is not zero, we continue with a search in the Newton direction. This gives     −1 T  −1 2/3 (3)−1 (2) = . Z¯ ∇f (x2 ) = − p = −Z¯ Z¯ T∇ 2 f (x2 )Z¯ 1 −2/3 The maximum step to the boundary is α¯ = 7/2, and hence the step length is α = 1. This gives       7/3 2/3 5/3 . = +1 x3 = 5/3 −2/3 7/3 At the new point the reduced gradient is Z¯ T∇f (x3 ) = ( −1

 1)

−2/3 −2/3 

Since T λ¯ = ( λ2 ) = A¯ r ∇f (x3 ) = ( −1

0)



−2/3 −2/3

= (0).  = (2/3) > 0,

the point satisfies the first-order optimality conditions and we terminate. Since the objective function f is strictly convex, the solution x = (7/3, 5/3)T is a strict global minimizer. The Lagrange multipliers corresponding to the three constraints are λ1 = 0, λ2 = 2/3, λ3 = 0. The progress of the algorithm is shown in Figure 15.2. There are various modifications that can be made to the basic active-set method. Here we just give a brief overview of them. One possible modification is to solve the equality-constrained subproblems inexactly, whenever there is reason to believe that the working set is not the optimal active set. The rationale is that faster progress may be made by obtaining a “better” working set than by getting a few extra digits of accuracy on an incorrect set. This idea requires care in

i

i i

i

i

i

i

570

book 2008/10/23 page 570 i

Chapter 15. Feasible-Point Methods

x1

x0

x3

x2

Figure 15.3. Zigzagging. implementation, however. The reason is that as the solution to a problem becomes less accurate, the computed Lagrange multipliers also become less accurate. These inaccuracies can affect the sign of a computed Lagrange multiplier. Consequently, a constraint may erroneously be deleted from the working set, thereby wiping out any potential savings. Another possible danger is zigzagging. This phenomenon can occur if the iterates cycle repeatedly between two working sets. This situation is depicted in Figure 15.3. Zigzagging cannot occur if the equality-constrained problems are solved sufficiently accurately before constraints are dropped from the working set. To conclude, we indicate how the active-set method can be adapted to solve a problem of the form minimize f (x) subject to A1 x ≥ b1 A2 x = b2 containing a mix of equality and inequality constraints. In this case, the equality constraints are kept permanently in the working set W since they must be kept satisfied at every iteration. The Lagrange multipliers for equality constraints can be positive or negative, and so do not play a role in the optimality test. The equality constraints also do not play a role in the selection of the maximum allowable step length α. ¯ These are the only changes that need be made to the active-set method.

15.4.1

Linear Programming

The simplex method for linear programming is a special case of an active-set method.16 Suppose that we were trying to solve a linear program with n variables and m linearly independent equality constraints: minimize subject to 16 This

f (x) = cTx Ax = b x ≥ 0.

section uses the notation of Chapters 4 and 5.

i

i i

i

i

i

i

15.4. Linear Inequality Constraints

book 2008/10/23 page 571 i

571

Assume for simplicity that the problem is not degenerate. The matrix A represents only the general constraints and does not include the nonnegativity constraints. Let xk be a basic feasible solution, with the variables ordered so that   xB xk = , xN where xB is the vector of basic variables and xN is the (currently zero) vector of nonbasic variables. We write   cB A = ( B N ) and c = . cN The current working set corresponds to the equations      xB b ¯ k≡ B N . Ax = 0 0 I xN This is a system of n equations in n unknowns, and so   −1 −1 B −B −1 N A¯r = A¯ = . 0 I The right-most portion of A¯ r is the same as the null-space matrix   −B −1 N ¯ Z= I that would be obtained if variable reduction were applied to A. The first step in the active-set method is the optimality test. Since A¯ is an n × n invertible matrix, the corresponding null-space matrix Z¯ is empty, and so Z¯ T∇f (xk ) = Z¯ Tc = 0. (This is guaranteed to occur, so this step is not an explicit part of the algorithm.) Lagrange multipliers are computed from the formula T λ¯ = A¯ r ∇f (xk )    cB B −T 0 = cN −N TB −T I   B −T cB = . cN − N TB −T cB

Hence λ¯ consists of the vector of simplex multipliers y = B −T cB together with the vector of reduced costs cˆN = cN −N TB −T cB . The simplex multipliers y are the Lagrange multipliers for the general constraints Ax = b, and so there is no sign restriction on them. The reduced costs are the multipliers for the constraints xN ≥ 0. For xk to be optimal, the reduced costs must be nonnegative. If the optimality conditions are not satisfied, then cˆj < 0 for some j , and the constraint xj ≥ 0 is dropped from the working set. This corresponds to deleting one of the bottom

i

i i

i

i

i

i

572

book 2008/10/23 page 572 i

Chapter 15. Feasible-Point Methods

¯ A feasible descent direction must then be determined. Such a direction p rows from A. must satisfy Ap = 0 and so, if variable reduction is used, p can be written in the form   −B −1 N ¯ v = Zv p= I for some v. In addition, the other nonbasic variables must remain zero. This further restriction implies that we can choose p = Z¯ j , where Z¯ j is the column of Z¯ corresponding to cˆj . This is the same search direction as in the simplex method (see Section 5.3.2). If a step of length α is taken along the search direction p, then the value of the objective function is given by f (xk + αp) = cTxk + α cˆj and so f (xk + αp) < f (xk ) for all α > 0. The greatest reduction in f is obtained by taking the maximum feasible step along p. The upper bound α¯ on α is determined by a ratio test, a test that is the same in the simplex method as in the active-set method. In the simplex method, the step length is α = α, ¯ and a new constraint boundary is encountered. This boundary corresponds to one of the nonnegativity constraints becoming ¯ making it again active, that is, to a variable leaving the basis. Hence a row is added to A, an n × n invertible matrix of the same general form as before. This completes an iteration of the active-set method. The above remarks show that the simplex method is an active-set method in which variable reduction is used to represent the null space of the general constraints.

Exercises 4.1. Apply the simple active-set method to the problem in Example 15.5, using the initial guess x0 = (5, 9, 2)T, and with f (x) = x12 + 2x22 + 3x32 . Compute a search direction using a reduced Newton method. 4.2. Suppose that a quasi-Newton approximation is used to compute the search direction within the simple active-set method, and that only an approximation to the reduced Hessian is maintained. (i) Indicate how to adjust the quasi-Newton approximation to the reduced Hessian when a constraint is added or dropped from the working set. (ii) If a positive-definite quasi-Newton update formula is used, do your techniques guarantee that the approximation to the reduced Hessian remains positive definite? 4.3. Suppose that a constraint is dropped from the working set in the optimality test for the simple active-set method. If the search direction is computed using a reduced Newton method, and the Hessian is positive definite, is the search direction a feasible descent

i

i i

i

i

i

i

15.5. Sequential Quadratic Programming

book 2008/10/23 page 573 i

573

direction at the current iteration? What if some other method is used to compute the search direction? 4.4. Let A¯ be the matrix corresponding to the working set, and assume that an orthogonal T T T projection matrix P = I − A¯ (A¯A¯ )−1A¯ is used as the null-space matrix. Let the constraint a Tx ≥ b be added to the working set, and assume that P a = 0. Prove that the new orthogonal projection matrix Pˆ satisfies Pˆ = P − P a(a TP a)−1 a TP . What happens if P a = 0? 4.5. Derive a “steepest-edge” rule to select a constraint to drop from the active set. (See Section 7.6.1.) 4.6. Consider the optimization problem in Example 15.7. At the solution x∗ , the active set includes only the second constraint. For every feasible point x corresponding to this active set, compute an estimate λ of the optimal Lagrange multiplier λ∗ using the right inverse in the example. What is the relationship between x − x∗  and |λ − λ∗ |? For what values of x is the sign of the multiplier estimate correct? 4.7. Suppose that the line search within the active-set method uses a backtracking approach (see Section 11.5). Specify the algorithm for this line search. What conditions must the step length α satisfy? 4.8. Suppose that the line search within the active-set method is based on a Wolfe condition (see Section 11.5.1). What conditions must the step length α satisfy? 4.9. Consider the linear programming example from Section 5.2. Reinterpret the iterations of the simplex method as steps in an active-set method. 4.10. Write a computer program to solve the problem minimize subject to

f (x) = 12 x TQx − cTx Ax ≥ b,

where Q is positive definite and A is an m × n matrix of full row rank. Use an active-set method based on a reduced Newton search direction. You may assume that the initial guess is a feasible point and that α¯ is always positive. Use your method to solve the problem minimize f (x) = x12 + 2x22 subject to x1 − x2 ≥ 3 2x1 − 3x2 ≥ 6. Use the initial guess x0 = (8, 2)T. Include an upper limit on the number of iterations (10 should be more than sufficient here). At each iteration print out the current point, the working set, the reduced gradient, the Lagrange multipliers (if applicable), the search direction, and the step size. Plot the sequence of iterates obtained.

15.5

Sequential Quadratic Programming

Sequential quadratic programming is a popular and successful technique for solving nonlinearly constrained problems. The main idea is to obtain a search direction by solving

i

i i

i

i

i

i

574

book 2008/10/23 page 574 i

Chapter 15. Feasible-Point Methods

a quadratic program, that is, a problem with a quadratic objective function and linear constraints. This approach is a generalization of Newton’s method for unconstrained minimization. As was pointed out in Section 14.6, methods for solving minimize subject to

f (x) g(x) = 0

can be derived by applying Newton’s method to the corresponding optimality conditions. (Here g is a vector of m functions gi .) The Lagrangian for this problem is L(x, λ) = f (x) − λTg(x), and the first-order optimality condition is ∇L(x, λ) = 0. Then the formula for Newton’s method is       xk+1 xk pk = + , λk+1 λk νk where pk and νk are obtained as the solution to the linear system   pk ∇ 2 L(xk , λk ) = −∇L(xk , λk ). νk This linear system has the form      2 ∇xx L(xk , λk ) −∇g(xk ) pk −∇x L(xk , λk ) . = νk g(xk ) −∇g(xk )T 0 We will use these formulas to develop one of the most successful classes of methods for constrained optimization. This system of equations represents the first-order optimality conditions for the optimization problem minimize

2 q(p) = 12 p T [∇xx L(xk , λk )]p + p T [∇x L(xk , λk )]

subject to

[∇g(xk )]Tp + g(xk ) = 0,

with νk the vector of Lagrange multipliers. This optimization problem is a quadratic program; that is, it is the minimization of a quadratic function subject to linear constraints. The quadratic function is a Taylor series approximation to the Lagrangian at (xk , λk ), and the constraints are a linear approximation to g(xk + p) = 0. In Chapter 11, where we examined unconstrained problems, the formulas for Newton’s method corresponded to the minimization of a quadratic approximation to the objective function. Now in the constrained case, the formulas for Newton’s method correspond to the constrained minimization of a quadratic approximation to the Lagrangian. In a sequential quadratic programming method, at each iteration a quadratic program is solved to obtain (pk , νk ). These are used to update (xk , λk ), and the process repeats at the new point. Each of the quadratic programs is solved using the techniques described in Section 15.2.

i

i i

i

i

i

i

15.5. Sequential Quadratic Programming

book 2008/10/23 page 575 i

575

Example 15.8 (Sequential Quadratic Programming Method). We apply the SQP method to the problem minimize f (x1 , x2 ) = e3x1 + e−4x2 subject to g(x1 , x2 ) = x12 + x22 − 1 = 0. The solution to this problem is x∗ ≈ (−0.74834, 0.66332)T with λ∗ ≈ −0.21233. We use the initial guess x0 = (−1, 1)T and λ0 = −1. At this point     0.14936 3e3x1 = ∇f = −0.07326 −4e−4x2     3x 0.44808 0 9e 1 0 2 ∇ f = = 0 0.29305 0 16e−4x2 g = x12 + x22 − 1 = ( 1 )       −2 2x1 2 0 2 ∇ g= = ∇g = 2 0 2 2x2   −1.85064 ∇x L = ∇f − λ∇g = 1.92674   2.44808 0 2 2 2 ∇xx L = ∇ f − λ∇ g = . 0 2.29305 The corresponding quadratic program is minimize subject to

2 q(p) = 12 p T[∇xx L]p + p T[∇x L] [∇g]Tp + g = 0.

Its solution can be found using the first-order optimality conditions for the quadratic program:  2     −∇x L ∇xx L −∇g p = ν −∇g T 0 g or



2.44808 0 0 2.29305 2 −2

The solution of the quadratic program is   0.22577 p0 = −0.27423

2 −2 0



and

and the new estimates of the solution are

p1 p2 ν



 =

1.85064 −1.92674 1

 .

ν0 = ( −0.64896 ),

 −0.77423 0.72577 λ1 = λ0 + ν0 = ( −0.35104 ) . 

x1 = x0 + p0 =

The complete iteration is given in Table 15.1. Notice the rapid convergence rate, as expected for Newton’s method.

i

i i

i

i

i

i

576

book 2008/10/23 page 576 i

Chapter 15. Feasible-Point Methods

Table 15.1. Sequential quadratic programming method. k 0 1 2 3 4 5

xk −1.00000 −0.77423 −0.74865 −0.74834 −0.74834 −0.74834

1.00000 0.72577 0.66614 0.66332 0.66332 0.66332

λk

∇x L

g

−1.00000 −0.35104 −0.21606 −0.21232 −0.21233 −0.21233

3 × 100 4 × 10−1 1 × 10−2 4 × 10−6 3 × 10−11 1 × 10−16

1 × 100 1 × 10−1 4 × 10−3 8 × 10−6 2 × 10−11 0

Computing the updates pk and νk by solving the quadratic program corresponds to applying Newton’s method to the optimality conditions for the original problem. As a result, if the initial point is “close enough” to the solution, this method will have a quadratic convergence rate, provided that ∇ 2 L(x∗ , λ∗ ) is nonsingular. This rapid convergence rate is observed in the example. The Hessian of the Lagrangian will be nonsingular if the regularity condition and the second-order sufficiency conditions for the original optimization problem 2 are satisfied, that is, if ∇g(x∗ ) is of full rank and if Z T∇xx L(x∗ , λ∗ )Z is positive definite, T where Z is a basis matrix for the null space of ∇g(x∗ ) ; see the Exercises. The sequential quadratic programming method outlined above is not often used in this simple form. There are two major reasons for this. First, it is not guaranteed to converge to a local solution to the optimization problem. Second, it is not always appropriate to use Newton’s method because of its computational costs. These are the same reasons that the classical Newton method is not always used in the unconstrained case. We first discuss the issue of computational costs. The method outlined above requires the Hessians of the objective function f and the constraint functions g. Once these have been obtained, a quadratic program must be solved to determine the updates pk and νk (this corresponds to solving the linear system of optimality conditions for the quadratic program). As in the unconstrained case, it would be desirable to reduce these requirements for derivatives and to reduce the number of arithmetic operations required at each iteration of the algorithm. If large problems are being solved, it would also be desirable to reduce the storage requirements by using computational techniques that do not require matrix storage. One way to reduce the expense of this algorithm is to use a quasi-Newton approximation to the Hessian of the Lagrangian (see Section 12.3). If this is done, then second derivatives need not be computed. In addition, the quasi-Newton matrix can be maintained in the form of a factorization, and in this way the arithmetic costs of the method can also be reduced. Choosing an update formula for the quasi-Newton approximation in the constrained case can be a more complicated decision than in the unconstrained case. For example, one might choose to approximate the full Hessian of the Lagrangian, or perhaps just the reduced Hessian. This choice can affect the convergence theory for the method. (See the Notes.) Convergence results for the sequential quadratic programming method are obtained by insisting that (xk+1 , λk+1 ) be a “better” estimate of the solution than (xk , λk ). In the

i

i i

i

i

i

i

15.5. Sequential Quadratic Programming

book 2008/10/23 page 577 i

577

unconstrained case, progress is measured in terms of the objective function. In the constrained case it is common to measure progress in terms of an auxiliary merit function. Usually, a merit function is the sum of terms that include the objective function and the amount of infeasibility of the constraints. If the new point reduces the objective function and reduces infeasibility, then the value of the merit function will decrease. In many instances, however, improvements in the objective value come at the expense of feasibility, and vice versa, so the merit function must balance these two goals. One example of a merit function is the quadratic penalty function M(x) = f (x) + ρg(x)Tg(x) = f (x) + ρ

m

gi (x)2 ,

i=1

where ρ is some positive number. The greater the value of ρ, the greater the penalty for infeasibility. This merit function is a function of x only; other examples of merit functions may be functions of both x and λ. Example 15.9 (Merit Function). Let us use the merit function M(x) = f (x) + 10g(x)Tg(x) to measure the progress of the sequential quadratic programming method in the previous example. At the first iteration x0 = ( −1.00000 f (x0 ) = 0.068103 g(x0 ) = 1.00000 M(x0 ) = 10.068103

1.00000 )T

x1 = ( −0.77423 f (x1 ) = 0.152864 g(x1 ) = 0.126174 M(x1 ) = 0.312063

0.72577 )T

and

so, in terms of this merit function, the point x1 is better than the point x0 . At the next iteration, x2 = ( −0.74865 f (x2 ) = 0.175457 g(x2 ) = 0.004219 M(x2 ) = 0.175635,

0.66614 )T

indicating that x2 is better than both x1 and x0 for this merit function. Ideally, the merit function would be chosen so that (x∗ , λ∗ ) would be a local minimizer of the merit function if and only if it were a local solution of the optimization problem. If this were true, then a line search with respect to the merit function could be performed:       xk+1 xk pk = +α , λk+1 λk νk

i

i i

i

i

i

i

578

book 2008/10/23 page 578 i

Chapter 15. Feasible-Point Methods

where α is chosen so that M(xk+1 , λk+1 ) < M(xk , λk ). For this to be successful, the search direction from the quadratic program would have to be a descent direction for the merit function. The convergence theorem for unconstrained minimization (Theorem 11.7) could then be adapted to prove convergence in the constrained case. Unfortunately, it is rarely possible to guarantee that the local minimizers of the merit function and the local solutions of the optimization problem coincide. For the merit function M(x) = f (x) + ρg(x)Tg(x), some of the local minimizers of M approach local solutions of the constrained problem in the limit as ρ → ∞ (see Section 16.2). In addition M may have local minima at points where g(x) = 0, that is, at infeasible points. Other merit functions have analogous deficiencies that can limit the applicability of convergence theorems or can complicate the development of sequential quadratic programming methods. In the unconstrained case we assume that search directions are descent directions with respect to the objective function. In this setting, we assume that either pk or the combined vector (pk , νk ) is a descent direction with respect to the merit function. A common way to guarantee this is to insist that the reduced Hessian for the quadratic program be positive definite. (Recall that in the unconstrained case we insisted that the Hessian of the quadratic model be positive definite.) If a quasi-Newton approximation to the Hessian is used to define the quadratic program, then positive-definiteness of the reduced Hessian is often guaranteed by the choice of quasi-Newton update formula. If Newton’s method is used, so that the Hessian in the 2 quadratic program is ∇xx L(xk , λk ), then it is necessary to test if the reduced Hessian is positive definite, and to modify it if it is not. (See also Section 11.4.) In the constrained case, testing whether the reduced Hessian is positive definite is more complicated than in the unconstrained case, particularly if the quadratic program is solved via the linear system      2 ∇xx L(xk , λk ) −∇g(xk ) pk −∇x L(xk , λk ) . = g(xk ) νk −∇g(xk )T 0 In this case, the reduced Hessian may not be available, and more elaborate tests for positivedefiniteness must be used. Near the solution of the constrained problem we would normally like to take a step of α = 1 in the line search so that the quadratic convergence rate of Newton’s method could be achieved. Hence the merit function should be chosen so that a step of α = 1 is guaranteed to be accepted in the limit as the solution is approached. For certain merit functions this is not true. In such cases it is possible to give examples where a step of α = 1 is unacceptable at every iteration, no matter how close the current point is to the solution. We will ignore many of these difficulties and only prove that pk is a descent direction for the quadratic penalty merit function. Even more, we will make the simplifying assumption that the full Hessian of the Lagrangian (or some approximation to it) is positive definite. If a quasi-Newton approximation to the Hessian is used, this assumption is not

i

i i

i

i

i

i

15.5. Sequential Quadratic Programming

book 2008/10/23 page 579 i

579

unreasonable, but for Newton’s method it is restrictive. The lemma below (together with Theorem 11.7) can be used to show that lim ∇M(xk ) = 0.

k→∞

For large values of ρ, local solutions of the constrained problem are approximate local minimizers of M(x) to within O(1/ρ), and so this argument provides the rough outline of a convergence theorem. For further results, ones with less restrictive assumptions and with more satisfying conclusions, see the references mentioned in the Notes. Lemma 15.10 (Descent Direction for Merit Function). Assume that (pk , νk ) is computed as the solution to the quadratic program minimize subject to

q(p) = 12 p T Hp + p T [∇x L(xk , λk )] [∇g(xk )]Tp + g(xk ) = 0,

2 where H is some positive-definite approximation to ∇xx L(xk , λk ). If pk = 0, then

pkT∇M(xk ) < 0 for all sufficiently large values of ρ, where M(x) = f (x) + ρg(x)Tg(x); that is, pk is a descent direction with respect to this merit function. Proof. For simplicity, we omit the subscript k on most vectors and write ∇x L ≡ ∇x L(xk , λk ), etc. The proof is based directly on the optimality conditions for the quadratic program Hp = −∇f + ∇g(λ + ν) ∇g Tp = −g. The first of these conditions implies that ˆ pT∇f = −pTHp + p T∇g λ, where λˆ ≡ λ + ν. Using these conditions we obtain p T∇M = pT∇f + 2ρp T(∇g)g = pT∇f − 2ρg Tg = −pTHp + p T(∇g)λˆ − 2ρg Tg = −p THp − g Tλˆ − 2ρg Tg. The first term is negative, since we have assumed that H is positive definite and p = 0. If g = 0, then p T∇M < 0. If g = 0, then we can ensure that p T∇M < 0 by choosing ρ large enough. To see this, we write the last two terms as m

(−gi λˆ i − 2ρgi2 ),

i=1

i

i i

i

i

i

i

580

book 2008/10/23 page 580 i

Chapter 15. Feasible-Point Methods 

and so if ρ > max i

λˆ i − : gi = 0 2gi

 ,

the summation will be negative, showing that p is a descent direction. So far we have discussed only problems with equality constraints. Consider now a problem of the form minimize subject to

f (x) g1 (x) ≥ 0 g2 (x) = 0, where g1 and g2 are vectors of constraint functions. We can develop a sequential quadratic programming method for this problem as well. Our earlier quadratic program was based on a quadratic approximation to the Lagrangian function and a linear approximation to the constraints. If the same approximations are used here, we obtain minimize

2 q(p) = 12 p T [∇xx L(xk , λk )]p + p T [∇f (xk )]

subject to

[∇g1 (xk )]Tp + g1 (xk ) ≥ 0 [∇g2 (xk )]Tp + g2 (xk ) = 0.

The solution pk to this quadratic program provides the step to the next estimate of the solution of the original constrained problem, and the Lagrange multipliers provide an estimate of the Lagrange multipliers of the original problem. The objective for this quadratic problem includes the term pT [∇f (xk )]—not pT [∇x L(xk , λk )] as might have been expected. Without this modification, the method is not guaranteed to converge. (See the Exercises.) The references in the Notes discuss the case where the quadratic program has no solution. This quadratic program can be solved using the active-set method discussed in Section 15.4.

Exercises 5.1. Show that the solution to minimize subject to

f (x) = e3x1 +4x2 g(x1 , x2 ) = x12 + x22 − 1 = 0

is x∗ = (− 35 , − 45 )T with λ∗ = − 52 e−5 . Set up and solve the quadratic subproblem at x = ( 35 , 54 )T and λ = 52 e−5 . 5.2. Prove that the Hessian of the Lagrangian function L(x, λ) = f (x) − λTg(x) will be nonsingular if the regularity condition and the second-order sufficiency conditions for the original optimization problem are satisfied, that is, if ∇g(x∗ ) is of full 2 rank and if Z T∇xx L(x∗ , λ∗ )Z is positive definite, where Z is a basis matrix for the null space of ∇g(x∗ ).

i

i i

i

i

i

i

15.6. Reduced-Gradient Methods

book 2008/10/23 page 581 i

581

5.3. Consider the problem

f (x) = x TQx x Tx ≤ 1,

minimize subject to



where Q=

2 0

0 1

 .

Suppose that x0 = (1, 1)T and that λ0 is specified. Find x1 and λ1 using the sequential quadratic programming method. Under what conditions is λ1 = λ0 ? 5.4. (This problem illustrates a pathology of sequential quadratic programming called the Maratos effect.) Consider the problem minimize

f (x) = 2(x12 + x22 − 1) − x1

subject to

x12 + x22 − 1 = 0.

(i) Prove that x∗ = (1, 0)T is the minimizer with associated multiplier λ∗ = 3/2. (ii) Suppose that xk = (cos θ, sin θ)T, where θ ≈ 0. Verify that xk is feasible and close to x∗ . Let λk = λ∗ . Set up and solve the corresponding quadratic program at this point. Show that the solution is pk = (sin2 θ, − sin θ cos θ)T. What is νk ? Show that if xk+1 = xk + pk , then f (xk+1 ) > f (xk ) and that xk+1 is infeasible. This shows that, even when close to the solution, a unit step along the Newton direction may increase the value of any merit function. 5.5. Suppose that you wish to solve an optimization problem of the form minimize subject to

f (x) g1 (x) ≥ 0 g2 (x) = 0,

where the search directions are computed using the quadratic subproblem minimize

2 q(p) = 12 p T [∇xx L(xk , λk )]p + p T [∇x L(xk , λk )]

subject to

[∇g1 (xk )]Tp + g1 (xk ) ≥ 0 [∇g2 (xk )]Tp + g2 (xk ) = 0.

Suppose that the initial guess for the Lagrange multipliers satisfies λ0 > λ∗ . Prove that the estimates of the Lagrange multipliers for the inequality constraints do not converge to the optimal Lagrange multipliers.

15.6

Reduced-Gradient Methods

Reduced-gradient methods try to maintain feasibility at every iteration. This approach has several advantages. If each estimate of the solution is feasible, the algorithm can be stopped before it converges, and the approximate solutions may still be useful. Also, guaranteeing convergence is simpler because progress can be measured directly using the value of the objective function, rather than with an auxiliary merit function. The disadvantage of

i

i i

i

i

i

i

582

book 2008/10/23 page 582 i

Chapter 15. Feasible-Point Methods

reduced-gradient methods is the computational expense of ensuring that nonlinear constraints remain satisfied at every iteration. We apply a version of the reduced-gradient method to the problem minimize subject to

f (x) g(x) = 0,

where g is a vector of m functions gi . Our derivation begins the same way as for sequential quadratic programming. The Lagrangian is L(x, λ) = f (x) − λTg(x), and if Newton’s method is applied to the first-order optimality condition, then       xk pk xk+1 = + , λk+1 λk νk where pk and νk are obtained as the solution to the linear system   pk ∇ 2 L(xk , λk ) = −∇L(xk , λk ). νk This linear system has the form      2 ∇xx L(xk , λk ) −∇g(xk ) pk −∇x L(xk , λk ) . = νk g(xk ) −∇g(xk )T 0 It is at this point that the derivations for the two methods diverge. In the reduced-gradient method we use these formulas to derive a portion of the search direction, that is, the portion that lies in the null space of the constraint gradients. If Zk is a basis matrix for the null space of ∇g(xk )T, and Yk is a basis matrix for the range space of ∇g(xk ), then pk = Zk pZ + Yk pY , where pZ is the solution to the reduced system 2 L(xk , λk )]Zk pZ = −ZkT∇x L(xk , λk ). ZkT[∇xx

This formula determines pZ in the reduced-gradient method. If all the constraints are linear, then this formula is equivalent to the formula for the reduced Newton method derived in Section 15.2. In that case the matrix Zk will be the same at every iteration, and 2 L(xk , λk ) = ∇ 2 f (xk ) ∇xx

ZkT∇x L(xk , λk ) = ZkT∇f (xk ). (This last equation is valid even in the nonlinear case; see the Exercises.) Hence the reducedgradient method is a generalization of the reduced Newton method for linearly constrained problems.

i

i i

i

i

i

i

15.6. Reduced-Gradient Methods

book 2008/10/23 page 583 i

583

The remaining portion of the search direction is determined from the condition that the new estimate of the solution must be feasible: g(xk+1 ) = 0. Since xk+1 = xk + pk , this condition has the form g(xk + Zk pZ + Yk pY ) = 0. This is a system of m nonlinear equations in the m variables pY . (We are assuming here that ∇g(xk ) is a matrix of full rank.) If the constraints are linear, then pY = 0. If the constraints are nonlinear, some auxiliary algorithm must be applied to this nonlinear system to determine pY . For example, Newton’s method could be used. The reduced-gradient method is illustrated in the following example. Example 15.11 (Reduced-Gradient Method). We apply the reduced-gradient method to the same problem used in Example 15.8: minimize

f (x1 , x2 ) = e3x1 + e−4x2

subject to

g(x1 , x2 ) = x12 + x22 − 1 = 0.

The solution to this problem is x∗ ≈ (−0.74834, 0.66332)T with λ∗ ≈ −0.212325. We again use the initial guess x0 = (−1, 1)T, even though this point does not satisfy the constraints. At this point     3e3x1 0.14936 ∇f = = −0.07326 −4e−4x2   3x   1 9e 0.44808 0 0 ∇ 2f = = 0 0.29305 0 16e−4x2 g = x12 + x22 − 1 = ( 1 )      −2 2 2x1 ∇ 2g = = ∇g = 2 0 2x2

0 2

 .

An estimate of the Lagrange multiplier is needed to determine the gradient and Hessian of the Lagrangian. We compute a multiplier estimate λk by solving minimize ∇f (xk ) − λ∇g(xk )22 . λ

At the initial point x0 , the multiplier estimate is λ0 = −0.055655. Using this value we obtain   0.03805 ∇x L = ∇f − λ∇g = 0.03805   0.55939 0 2 ∇xx . L = ∇ 2 f − λ∇ 2 g = 0 0.40436 We use variable reduction to compute the null-space matrix Zk and the range-space matrix Yk , based on ∇g T = ( 2x1 2x2 ) ≡ ( B N ) . 

Then Zk =

−B −1 N I



 =

−x2 /x1 1

 and

Yk = 

1 x12 + x22



x1 x2

 .

i

i i

i

i

i

i

584

book 2008/10/23 page 584 i

Chapter 15. Feasible-Point Methods   1 . Z0 = 1

At this iteration

The null-space portion of the search direction is obtained by solving 2 ZkT[∇xx L]Zk pZ = −ZkT∇x L,

or (0.963754)pZ = −0.076099, so that pZ = −0.078961. The remaining portion of the search direction, Yk pY , is determined by solving g(xk + Zk pZ + Yk pY ) = 0 using Newton’s method. In this example,  Yk pY =

y1 y2

 γ

for some unknown γ , where y1 and y2 are the components of Yk . If we define xˆk = xk +Zk pZ , then the condition for Yk pY has the form φ(γ ) ≡ (xˆ1 + γ y1 )2 + (xˆ2 + γ y2 )2 − 1 = 0. Applying Newton’s method to this equation gives the iteration γi+1 = γi −

φ(γi ) (xˆ1 + γi y1 )2 + (xˆ2 + γ y2 )2 − 1 − = γ . i φ (γi ) 2y1 (xˆ1 + γi y1 ) + 2y2 (xˆ2 + γi y2 )

In this example we initialize the iteration with γ0 = 0. Then γ0 γ1 γ2 γ3 γ4 γ5

= 0, = −0.35796205114318, = −0.41861845196074, = −0.42046619052517, = −0.42046790833490, = −0.42046790833638,

φ(γ0 ) = 1 × 100 φ(γ1 ) = 1 × 10−1 φ(γ2 ) = 4 × 10−3 φ(γ3 ) = 3 × 10−6 φ(γ4 ) = 3 × 10−12 φ(γ5 ) = −2 × 10−16 .

The overall search direction is       0.218355 −0.70711 1 p0 = Z0 pZ +Y0 pY = ( −0.420468 ) = ( −0.078961 )+ −0.376276 0.70711 1 

and x1 = x0 + p0 =

−0.78164 0.62372

 .

The complete iteration is given in Table 15.2. The initial guess of the solution is not feasible, but all later estimates of the solution are feasible (to 15 digits). The method converges rapidly, as expected for Newton’s method.

i

i i

i

i

i

i

15.6. Reduced-Gradient Methods

book 2008/10/23 page 585 i

585

Table 15.2. Reduced-gradient method. k 0 1 2 3

xk −1.00000 −0.78164 −0.74950 −0.74834

1.00000 0.62372 0.66201 0.66332

λk

∇x L

g

−0.055655 −0.215306 −0.212401 −0.212325

5 × 10−2 8 × 10−2 3 × 10−3 2 × 10−6

1 × 100 8 × 10−15 8 × 10−15 3 × 10−15

The reduced-gradient method corresponds to using Newton’s method in the null space of the constraints, and so it can be expected to converge quadratically in nondegenerate cases. This quadratic convergence rate is observed in Example 15.11. As before, Newton’s method is not guaranteed to converge, and even if it does converge, it may converge to a maximum or stationary point and not a minimum. Hence some globalization strategy must be employed to ensure convergence to a local solution of the optimization problem. A line search can be used to guarantee convergence, as was done with the sequential quadratic programming method. If all the solution estimates xk are feasible points, then the value of the quadratic penalty merit function is M(xk ) = f (xk ) + ρg(xk )Tg(xk ) = f (xk ), and so a line search can be performed using the objective function f itself as a merit function. As long as the conditions of Theorem 11.7 are satisfied, convergence is guaranteed. Example 15.12 (Progress Measured by Objective Function). For the problem in Example 15.11, the successive values of the objective function are f (x0 ) = 0.068103 f (x1 ) = 0.178359 f (x2 ) = 0.176349 f (x3 ) = 0.176347, so in this case the objective value increases at the first iteration while the reduced-gradient method finds a feasible point, but the objective value decreases at every other iteration, even though no line search is employed. The line search for a reduced-gradient method is more complicated than in the unconstrained case. For each trial value of the step length α, the trial point must satisfy g(xk + αZk pZ + Yk pY ) = 0. Hence pY depends on α and must be computed by solving a nonlinear system of equations. For “large” values of α there may be no pY that satisfies the constraints, further complicating the line search algorithm. For these reasons, it is not entirely correct to say that the reducedgradient method produces a search “direction” since in fact the method must search along an arc defined by pZ and α.

i

i i

i

i

i

i

586

book 2008/10/23 page 586 i

Chapter 15. Feasible-Point Methods

Theorem 11.7 makes several assumptions about the search direction and the step length. For example, the search direction must be a descent direction, that is, we require f (xk + Zk pZ + Yk pY ()) < f (xk ) for “small” positive values of . (Here we have written pY () to emphasize that pY depends on .) Conditions that guarantee descent are given in the following lemma. The remaining requirements of the convergence theorem can be derived in a similar manner. Lemma 15.13 (Descent Direction). Assume that the reduced-gradient method is applied to the problem minimize f (x) subject to g(x) = 0. Let xk be the kth estimate of the solution, with g(xk ) = 0. Assume that ∇g(x) is of full rank for all x in a neighborhood of xk . Also assume that the null-space portion pZ of the search direction is computed from 2 ZkT[∇xx L(xk , λk )]Zk pZ = −ZkT∇x L(xk , λk ),

where λk is an estimate of the Lagrange multipliers, and where 2 ZkT[∇xx L(xk , λk )]Zk

is positive definite. Define pY () as the solution to g(xk + Zk pZ + Yk pY ()) = 0. If ZkT∇x L(xk , λk ) = 0, then f (xk + Zk pZ + Yk pY ()) < f (xk ) for all sufficiently small positive values of . Proof. To simplify the proof, we omit the subscript k on all quantities and use the notation 2 H = ZkT[∇xx L(xk , λk )]Zk . Using a Taylor series expansion, we obtain f (x + ZpZ + YpY ()) = f (x) + ∇f (x)TZpZ + ∇f (x)TYpY () + O( 2 ) = f (x) − ∇f (x)TZH −1 Z T∇f (x) + ∇f (x)TYpY () + O( 2 ). If the matrix H is positive definite, then the second term in this expansion will be negative. If  is small enough, the final term will be negligible in comparison with the second term. We will prove that the third term is proportional to  2 , and so (for small enough values of ) it too will be negligible. We first prove that YpY () = O(), and then use this result to prove that YpY () = O( 2 ).

i

i i

i

i

i

i

15.6. Reduced-Gradient Methods

book 2008/10/23 page 587 i

587

We will analyze pY using the condition g(x + ZpZ + YpY ()) = 0. Expanding in a Taylor series, we obtain g(x) + ∇g(x + ξ )T(ZpZ + YpY ()) = 0, where x + ξ is some unknown point between x and x + ZpZ + YpY (). Since g(x) = 0, and since ∇g(x) is of full rank, we can rearrange this equation to obtain YpY () = −[∇g(x + ξ )∇g(x + ξ )T]−1 ∇g(x + ξ )TZpZ . This shows that YpY () = O(); it follows that ξ = O() also. To prove that YpY () = O( 2 ), we take the equation ∇g(x + ξ )T(ZpZ + YpY ()) = 0 and further expand ∇g(x + ξ ) using a Taylor series. We obtain [∇g(x) + O()]T(ZpZ + YpY ()) = 0. Since Z T∇g(x) = 0 (because Z is a null-space matrix for ∇g(x)), this is equivalent to ∇g(x)TYpY () = −O( 2 )ZpZ . Hence, because ∇g(x) is full rank, YpY () = −O( 2 )[∇g(x)∇g(x)T]−1 ZpZ = O( 2 ). Thus, f (x + ZpZ + YpY ()) = f (x) − ∇f (x)TZH −1 Z T∇f (x) + O( 2 ), and it now follows that descent is obtained for “small” positive values of . The lemma assumes that 2 ZkT[∇xx L(xk , λk )]Zk

is positive definite. This will not be true in general. If this condition is not satisfied, then the techniques in Section 11.4 can be used to guarantee that a descent direction is obtained. The reduced-gradient method need not be based on Newton’s method. Aquasi-Newton approximation to the Hessian, or the steepest-descent method, or a truncated-Newton method could be used instead to compute pZ . As in the unconstrained case, the overall method would converge at a slower rate. The main disadvantage of a reduced-gradient method is that each iteration can be expensive. The method (at least in the idealized form given here) insists that the estimates of the solution xk remain feasible. When the constraints are nonlinear, this means that a system of nonlinear equations must be solved at each trial point to restore feasibility. If the

i

i i

i

i

i

i

588

book 2008/10/23 page 588 i

Chapter 15. Feasible-Point Methods

constraints are “nearly” linear, or if there are not too many nonlinear constraints, then this will not be difficult. Otherwise, solving the nonlinear system may require a great deal of computation, and in some cases the nonlinear system will have no solution. Variants of the reduced-gradient method have been developed that are more flexible in that they allow some violation of the constraints. Such methods might be considered a compromise between reduced-gradient and sequential quadratic programming methods; see the Notes.

Exercises 6.1. Prove that Z(x)T∇x L(x, λ) = Z(x)T∇f (x).

15.7

Filter Methods

In this section we describe a multicriteria approach that guarantees convergence of optimization methods. This approach uses filters instead of merit functions to measure the progress of algorithms. For several reasons filter methods are an attractive alternative to the methods using merit functions. First, filter methods rely on primary goals— a decrease of the objective function and infeasibility—and therefore may not be sensitive to the choice of parameters or a particular merit function. Second, filter methods tend to allow more freedom in selecting the next trial point than methods based on penalty or merit functions. This can contribute to the efficiency of filter methods. Finally, filter methods demonstrate robust and efficient performance in practice. Filter methods are a new and active area of research. They can be based on a variety of different underlying optimization methods. Filter methods are analogous to the use of a merit function, since they are used to guarantee convergence. In this section we discuss filter methods in the context of SQP algorithms. Consider an optimization problem with equality constraints minimize subject to

f (x) gi (x) = 0,

i = 1, . . . , m.

We will discuss later how to treat inequality constraints. To guarantee convergence of the SQP method, in Section 15.5 we used a quadratic penalty function as a merit function, M(x) = f (x) + ρg(x)Tg(x) = f (x) + ρ

m

gi (x)2 ,

i=1

where ρ is the positive penalty parameter. Alternatively, some other merit functions can be used, e.g., π(x, ρ) = f (x) + ρg(x),

i

i i

i

i

i

i

15.7. Filter Methods

book 2008/10/23 page 589 i

589

where g(x) is some norm of the vector function g(x). (See Chapter 16.) A penalty function is the weighted sum of two terms that includes the objective function and some measure of infeasibility. Temporarily, let us use the following penalty function π(x, ρ) = f (x) + ρg(x) as a merit function to control convergence of the iterates xk . If π(xk+1 , ρ) < π(xk , ρ), then xk+1 is considered a better estimate of the solution than xk . The penalty function measures the decrease of a combination of the objective function f (x) and the infeasibility g(x). The parameter ρ > 0 specifies the relative importance of one criterion with respect to the other. For example, if ρ is small, then the penalty function emphasizes decrease of the objective function. However, if ρ is large, then the penalty function emphasizes decrease of the infeasibility. Numerical experiments reveal that the value of ρ can influence the performance of the algorithm. What is the best choice of ρ? This difficult question lacks a definitive answer. The best value of ρ may depend on the problem and on the distance from xk to the solution. Usually, practical algorithms start with a certain value of ρ and adjust it as required. Various strategies are possible for adjusting ρ. Is it possible to eliminate ρ altogether? The answer is yes, and filter methods are one way to achieve this. Instead of using penalty functions, filter methods consider decrease of the objective function and decrease of infeasibility as two criteria that must be controlled simultaneously. The main idea of filter methods is that the next trial point xk+1 is accepted if it improves at least one of two criteria: the value of the objective function or the infeasibility of the constraints. Our filter method will incorporate a function h(x) = g(x) that measures the infeasibility of the constraints; that is, (i) h(x) = 0 if and only if x is a feasible point, and (ii) the larger the value of h(x), the more infeasible x is considered to be. Suppose that we apply some optimization algorithm to the equality-constrained problem, and that it generates a sequence { xk } of estimates of the solution. We will use fk = f (xk ) and hk = h(xk ) to denote the corresponding objective values and infeasibilities. If fk+1 < fk and hk+1 < hk , then we will say that xk+1 is closer than xk to the solution of the problem. It would be ideal if this were true at every iteration, but that will not always happen. Even convergent algorithms do not guarantee that both inequalities fk+1 < fk and hk+1 < hk hold. Often outside of the feasible set, reduction of infeasibility results in an increase of the value of the objective function (see Figure 15.4). It can be better to accept xk+1 if there is a substantial decrease in just one of the two criteria, even if the other increases. That gives the algorithm more freedom in selecting iterates without compromising convergence properties. In the following we formalize the idea of filters. A pair (fq , hq ) is said to dominate another pair (fr , hr ) if and only if both fq ≤ fr and hq ≤ hr . A filter is said to be a list of pairs F = {(fj , hj ), j = 1, . . . , s} such that no pair dominates any other. A filter F = {(f1 , h1 ), (f2 , h2 ), (f3 , h3 )} is illustrated in Figure 15.5 (left). In the figure, one point dominates another if the first point is below and to the left of the second point. Every point in the filter generates a block consisting of the points dominated by this point, and the union of these blocks represents the set of points that are dominated by the filter. For example, (f2 , h2 ) generates the grey block shown in Figure 15.5 (left). Every ¯ is dominated by (f2 , h2 ). point in this block, e.g., (f¯, h), The filter is used to accept or reject the trial point xk+1 . The trial point xk+1 is accepted if and only if (fk+1 , hk+1 ) is included in the filter. In turn, (fk+1 , hk+1 ) is included

i

i i

i

i

i

i

590

book 2008/10/23 page 590 i

Chapter 15. Feasible-Point Methods

x*

xk +1

xk

Feasible set

f ( xk ) < f ( xk +1 ) < f ( x* )

Figure 15.4. Iterates can approach the solution outside the feasible set.

h(x)

h(x)

( f1 , h1 )

( f1 , h1 )

( f ,h)

( f 2 , h2 )

( f 2 , h2 ) ( f 4 , h4 ) ( f 3 , h3 )

( f 3 , h3 )

f (x)

f (x)

Figure 15.5. Filter.

in the filter if and only if (fk+1 , hk+1 ) is not dominated by any point from the filter. For ¯ is dominated by (f2 , h2 ). Therefore (f¯, h) ¯ is not example, in Figure 15.5 (left), (f¯, h) included in the filter. However, (f4 , h4 ) in Figure 15.5 (right) is not dominated by (f1 , h1 ), (f2 , h2 ), or (f3 , h3 ). Therefore (f4 , h4 ) is included in the filter, and the updated filter is F = {(f1 , h1 ), (f2 , h2 ), (f3 , h3 ), (f4 , h4 )}. In mathematical terms, (fk+1 , hk+1 ) is included in the filter if and only if either

fk+1 < fj

or

hk+1 < hj

for all

j = 1, . . . , s.

i

i i

i

i

i

i

15.7. Filter Methods

book 2008/10/23 page 591 i

591

h(x)

( f k , hk )

f (x) Figure 15.6. Filter and penalty.

After a new pair (fk+1 , hk+1 ) is included in the filter, all the pairs from the filter dominated by (fk+1 , hk+1 ) are eliminated from the filter. Thus, a filter can consist of as many as k + 1 pairs. However, at a certain iteration a new pair can dominate more than one old entry of the filter. If this happens, we can eliminate multiple entries from the filter and thus decrease the number of points in the filter. In general, we assume that a filter Fk consists of s ≤ k + 1 points. Figure 15.6 illustrates the difference between using filters and merit functions to accept trial points. For example, the contours of the merit function π(xk , ρ) would be straight lines with slope −ρ (see Figure 15.6) and only points to the left of this line would be accepted. Filter methods would accept all the points outside the grey area. The filter method is able to consider a larger set of points when choosing the next trial point. If a trial point is accepted by the merit function for some ρ > 0, it is also accepted by the filter. However, the reverse is not true. (See the Exercises.) If ρ is not chosen correctly, then the merit function can reject good trial points that would be accepted by the filter, or by the merit function with a different value of ρ. Thus, filter methods tend to be less restrictive than methods controlled by merit functions when the number of entries in the filter is small. The filter is used to accept or reject a trial point, but by itself it is not sufficient to guarantee convergence. It must be combined with either a line search or trust-region approach. (See Chapter 11.) Here we will use a trust-region approach, which was the approach used when filter methods were first developed. We will apply the filter method in the context of an SQP algorithm. At each iteration a quadratic program is solved to obtain a search direction p. The trust-region strategy imposes the following additional constraint to control the distance between xk+1 and xk : p ≤ k , where k > 0 is the maximum distance that we will allow between trial and current points.

i

i i

i

i

i

i

592

book 2008/10/23 page 592 i

Chapter 15. Feasible-Point Methods p2 ∇g

(x

k

)T

p+

g(

xk

)=

0

p1 Trust region

Figure 15.7. Infeasibility.

At each iteration the SQP-filter method solves the following problem: minimize subject to

q(p) = 12 p T Hk p + p T ∇f (xk ) ∇g(xk )Tp + g(xk ) = 0 p ≤ k ,

2 L(xk , λk ) approximates the Hessian of the Lagrangian. If a solution to the where Hk ≈ ∇xx quadratic program is found, then the trial point is

xk+1 = xk + pk . If xk+1 is not accepted by the filter, then k is reduced and the quadratic program is solved again. If pk = 0, then xk is a first-order optimality point of the original problem with the Lagrange multipliers νk from the quadratic program. (See the Exercises.) If the infinity norm (p = max1≤i≤n |pi |) is used, then the trust-region constraint p ≤  k is equivalent to a set of bound constraints on the components of p. If the 2-norm   n 2 p = i=1 pi is used, then the constraint p ≤ k is equivalent to one quadratic inequality. (See the Exercises.) For a discussion of the norms see Appendix A.3. If the quadratic problem is infeasible, then two situations can occur. The first situation is when the linearized constraints ∇g(xk )Tp + g(xk ) = 0 are consistent, but k is too small (see Figure 15.7). This situation can be resolved by increasing k and solving the quadratic problem again. The second situation is when the linearized constraints are inconsistent. If this happens, the algorithm tries to restore feasibility before continuing. It ignores the value of f (x) and focuses on reducing h(x). For details on this topic, see the Notes. Practical algorithms

i

i i

i

i

i

i

15.7. Filter Methods

book 2008/10/23 page 593 i

593

may use various criteria when choosing between increasing k or restoring feasibility. The algorithm presented in this section always performs feasibility restoration followed by resetting k to some fixed initial value in the case where the quadratic problem is infeasible. Inequality constraints can be treated by the SQP-filter method in a similar way. Consider an optimization problem of the form minimize subject to

f (x) gi (x) ≥ 0, gi (x) = 0,

i∈I i ∈ E.

We can use the function ψi (x) = min(gi (x), 0) to measure infeasibility of the ith inequality constraint. The functions hI (x) = maxi∈I |ψi (x)| and hE (x) = maxi∈E |gi (x)| measure the infeasibility of the inequality and equality constraints, respectively. Then h(x) = max(hI (x), hE (x)) measures the overall infeasibility of the problem. There are other examples of functions that measure the infeasibility of the problem. Often the choice of h(x) is related to the method used for feasibility restoration. For details on this topic, see the Notes. Now the filter approach is applied to the general problem with objective function f (x) and infeasibility measure h(x). The quadratic program solved at each iteration now includes the linearized inequality constraints: + p T ∇f (xk )

minimize

1 T p Hk p 2

subject to

∇gI (xk )Tp + gI (xk ) ≥ 0 ∇gE (xk )Tp + gE (xk ) = 0 p ≤ k ,

p

where ∇gIT and ∇gET are the Jacobians corresponding to the inequality and equality constraints, respectively. The rest is the same as before. We are now able to present the SQP-filter algorithm. Algorithm 15.1. SQP-Filter Algorithm 1. Select x0 , λ0 . Set f0 = f (x0 ), h0 = h(x0 ). Initialize the filter: F0 = {(f0 , h0 )}. ¯ Select the initial trust-region radius 0 = . 2. For k = 0, 1, . . . (i) Solving the Quadratic Subproblem—Compute pk and the Lagrange multipliers νk by solving the quadratic subproblem + p T ∇f (xk )

minimize

1 T p Hk p 2

subject to

∇gI (xk )Tp + g(xk ) ≥ 0 ∇gE (xk )Tp + g(xk ) = 0 p ≤ k .

p

(ii) The Optimality Test—If pk = 0, then stop. Output xk , λk = νk .

i

i i

i

i

i

i

594

book 2008/10/23 page 594 i

Chapter 15. Feasible-Point Methods (iii) The Restoration Test—If the quadratic subproblem is infeasible, then perform feasibility restoration: determine xk+1 such that hk+1 = h(xk+1 )
0, then xk+1 will be accepted by the filter. 7.5. Consider again a filter with one entry, as illustrated in Figure 15.6. Prove that if a trial point xk+1 is accepted by the filter, then there exists ρ¯ > 0 such that xk+1 will be accepted by the penalty function π(x, ρ), ¯ i.e., the following inequality holds: π(xk+1 , ρ) ¯ < π(xk , ρ). ¯ 7.6. Prove the following. (i) The trust-region constraint p ≤ k with the infinity norm (p = max1≤i≤n |pi |) is equivalent to a set of linear constraints.    n 2 (ii) The trust-region constraint p ≤ k with the 2-norm p = i=1 pi is equivalent to one quadratic inequality.

15.8

Notes

Active-Set Methods—One of the first practical active-set methods for nonlinear optimization was given in the paper by Rosen (1960). A detailed discussion can be found in the book by Gill, Murray, and Wright (1981). Sequential Quadratic Programming—SQP was first suggested in the Ph.D. thesis of Wilson (1963). Since then, the approach has been examined by a great many authors. A recent survey can be found in the paper by Boggs and Tolle (1995). If all the constraints are equalities, then algorithms can be designed that maintain feasibility at every iteration. (Hence the nonlinear objective function can be used as a merit function, a valuable simplification.) See, for example, the paper by Panier and Tits (1993). Reduced-Gradient Methods—Areduced-gradient method for problems with nonlinear constraints was first discussed in the paper by Abadie and Carpentier (1965). More recent results can be found in the papers by Abadie (1978) and Lasdon et al. (1978). Sophisticated

i

i i

i

i

i

i

15.8. Notes

book 2008/10/23 page 599 i

599

versions of reduced-gradient methods have been developed that allow some violation of the constraints. An example of such an algorithm is described in the paper by Drud (1992). Filter Methods—SQP-filter methods based on a trust-region approach were developed and analyzed by Fletcher and Leyffer (2002) and Fletcher et al. (2002). Since then, line search versions have been derived, and filter methods have been applied in the context of other optimization algorithms. For further information, see the survey paper by Fletcher et al. (2007).

i

i i

i

i

book 2008/10/23 page 600 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 601 i

Chapter 16

Penalty and Barrier Methods

16.1

Introduction

In Chapter 15 we discussed the use of feasible-point methods for solving constrained optimization problems. These methods are based on minimizing the Lagrangian function while attempting to attain and maintain feasibility. When inequality constraints are present, these methods generalize the simplex method. They solve a sequence of subproblems with a changing active set (or basis) until a solution to the original constrained problem is found. There are some major disadvantages to this approach. First, as the number of constraints increases, the number of potential subproblems increases exponentially. While the hope is that the algorithm will consider only a small proportion of these subproblems, there is no known method to guarantee that this indeed will be the case. (This was illustrated for the simplex method in Chapter 9.) Second, the idea of keeping the constraints satisfied exactly, although easily achieved in the case of linear constraints, is much more difficult to accomplish in the case of nonlinear constraints, and in some cases may not be desirable. In this chapter we discuss a group of methods, referred to here as penalization methods, that remove some of these difficulties. These methods solve a constrained optimization problem by solving a sequence of unconstrained optimization problems. The hope is that in the limit, the solutions of the unconstrained problems will converge to the solution of the constrained problem. The unconstrained problems involve an auxiliary function that incorporates the objective function or the Lagrangian function, together with “penalty” terms that measure violations of the constraints (various techniques differ in the way the auxiliary function is defined). The auxiliary function also includes one or more parameters that determine the relative importance of the constraints in the auxiliary function. By changing these parameters appropriately, a sequence of problems is generated where the effect of the constraints becomes increasingly pronounced. In contrast to active-set methods, the auxiliary function takes into account all constraints, even when inequalities are present, and thus the combinatorial difficulties of guessing a correct active set are avoided. Further, since penalization techniques do not attempt to keep the constraints satisfied exactly, they can be more suitable for handling nonlinear constraints. 601

i

i i

i

i

i

i

602

book 2008/10/23 page 602 i

Chapter 16. Penalty and Barrier Methods

Although penalization methods ameliorate some of the difficulties associated with feasible-point methods, they introduce difficulties of their own. In particular, straightforward applications of penalization can give rise to ill-conditioning. Sophisticated modern interpretations of this idea, however, resolve some of these issues and can be effective methods for challenging optimization problems.

16.2

Classical Penalty and Barrier Methods

The general class of penalization methods includes two groups of methods: one group imposes a penalty for violating a constraint, and the other imposes a penalty for reaching the boundary of an inequality constraint. We refer to the first group as penalty methods and to the second group as barrier methods. In this section we present the “classical” version of these methods. The methods in later sections can be viewed as modifications or enhancements to the classical penalty and barrier methods. We start with a geometrical motivation for these methods. Suppose that our constrained problem is given in the form minimize subject to where S is the set of feasible points. Define  0 σ (x) = +∞

f (x) x ∈ S, if x ∈ S if x ∈ S.

The function σ can be considered as an infinite penalty for violating feasibility. Hence the constrained problem can be transformed into an equivalent unconstrained problem minimize f (x) + σ (x).

(16.1)

Conceptually, if we could solve this unconstrained minimization problem, we would be done (a point x∗ is a solution to the constrained problem if and only it is a solution to this unconstrained problem). Unfortunately, this is not a practical idea, since the objective function of the unconstrained minimization is not defined outside the feasible region. Even if we were to replace the “∞” by a large number, the resulting unconstrained problem would be difficult to solve because of its discontinuities. Instead, barrier and penalty methods solve a sequence of unconstrained subproblems that are more “manageable,” and that gradually approximate problem (16.1). This is achieved by replacing the “ideal” penalty σ by a continuous function that gradually approaches σ . In barrier methods, this function (called a barrier term) approaches σ from the interior of the feasible region. It creates a barrier that prevents the iterates from reaching the boundary of the feasible region. In penalty methods this function (called a penalty term) approaches σ from the exterior of the feasible region. It serves as a penalty for being infeasible. Barrier methods generate a sequence of strictly feasible iterates that converge to a solution of the problem from the interior of the feasible region. For this reason they are also called interior-point methods. Since these methods require the interior of the feasible region to be nonempty, they are not appropriate for problems with equality constraints.

i

i i

i

i

i

i

16.2. Classical Penalty and Barrier Methods

book 2008/10/23 page 603 i

603

In contrast, penalty methods permit the iterates to be infeasible. A gradually increasing penalty is imposed for violation of feasibility, however. Penalty methods usually generate a sequence of points that converges to a solution of the problem from the exterior of the feasible region. These methods are usually more convenient on problems with equality constraints. Although the methods can also handle inequality constraints, the resulting unconstrained problems usually do not have continuous second derivatives, and barrier methods are often preferable. Despite their apparent differences, barrier and penalty methods have much in common. Their convergence theories are similar, and the underlying structure of their unconstrained problems is similar. Much of the theory for barrier methods can be replicated for penalty methods and vice versa. It is common to use the generic name “penalty methods” to describe both methods, with interior penalty methods referring to barrier methods, and exterior penalty methods referring to penalty methods.

16.2.1

Barrier Methods

Consider the nonlinear inequality-constrained problem minimize

f (x)

subject to

gi (x) ≥ 0,

i = 1, . . . , m.

(16.2)

The functions are assumed to be twice continuously differentiable. Barrier methods are strictly feasible methods; that is, the iterates lie in the interior of the feasible region. We assume, therefore, that the feasible set has a nonempty interior; that is, there exists some point x0 such that gi (x0 ) > 0 for all i. We also assume that it is possible to reach any boundary point by approaching it from the interior. Barrier methods maintain feasibility by creating a barrier that keeps the iterates away from the boundary of the feasible region. The methods use a barrier term that approaches the infinite penalty function σ . Let φ(x) be a function that is continuous on the interior of the feasible set, and that becomes unbounded as the boundary of the set is approached from its interior: φ(x) → ∞ as gi (x) → 0+ . Two examples of such a function are the logarithmic function φ(x) = −

m

log(gi (x))

i=1

and the inverse function φ(x) =

m

i=1

1 . gi (x)

Now let μ be a positive scalar. Then μφ(x) will approach σ (x) as μ approaches zero. This is demonstrated in Figure 16.1 for a one-dimensional problem with bound constraints. By adding a barrier term of the form μφ(x) to the objective, we obtain a barrier function βμ (x) = f (x) + μφ(x),

i

i i

i

i

i

i

604

book 2008/10/23 page 604 i

Chapter 16. Penalty and Barrier Methods μφ (x ) μ=1 μ=0.1 a 1/4 this yields the solution x1 (ρ) = x1 =

8ρ , 4ρ − 1

x2 (ρ) = x2 =

4ρ , 4ρ − 1

which is a local as well as a global minimizer. (The unconstrained problem has no minimum if ρ ≤ 1/4.) Note that x(ρ) is infeasible to the original constrained problem, since g(x(ρ)) = x1 + 2x2 − 4 =

4 16ρ −4= . 4ρ − 1 4ρ − 1

At any solution x(μ) we can define a Lagrange multiplier estimate as λ = −ρg(x(ρ)) =

−4ρ . 4ρ − 1

As ρ tends to ∞ we obtain lim x1 (ρ) = lim

ρ→∞

ρ→∞

2 = 2, 1 − 1/4ρ

lim x2 (ρ) = lim

ρ→∞

ρ→∞

1 = 1, 1 − 1/4ρ

and indeed x∗ = (2, 1)T is the minimizer for the constrained problem. Further, lim λ(ρ) = lim

ρ→∞

ρ→∞

−1 = −1, 1 − 1/4ρ

and indeed λ∗ = −1 is the Lagrange multiplier at x∗ . To demonstrate the ill-conditioning of the penalty function, we compute its Hessian matrix at x(ρ):   ρ 2ρ − 1 2 . ∇x πρ (x(ρ)) = 2ρ − 1 4ρ It can be shown that its condition number is approximately 25ρ/4. When ρ is large, the Hessian matrix is ill conditioned.

i

i i

i

i

i

i

16.2. Classical Penalty and Barrier Methods

book 2008/10/23 page 613 i

613

It is also possible to apply penalty methods to problems with inequality constraints. Consider, for example, the problem minimize subject to

f (x) gi (x) ≥ 0, i = 1, . . . , m.

Any continuous function ψ that satisfies the conditions (16.3) can serve as a penalty. Thus, for example, the quadratic-loss penalty function in this case is 1

[min(gi (x), 0)]2 . 2 i=1 m

ψ(x) =

This function has continuous first derivatives ∇ψ(x) =

m

[min(gi (x), 0)]∇gi (x),

i=1

but its second derivatives can be discontinuous at points where some constraint gi is satisfied exactly (see the Exercises). The same observation holds for other simple forms of the penalty function. Thus, one cannot safely use Newton’s method to minimize the function. For this reason, straightforward penalty methods have not been widely used for solving general inequality-constrained problems.

16.2.3

Convergence17

In this subsection we discuss the convergence properties of penalization methods. We focus on the convergence of barrier methods when applied to the inequality-constrained problem. Convergence results for penalty methods can be developed in a similar manner. We consider the problem minimize subject to

f (x) gi (x) ≥ 0,

i = 1, . . . , m.

Denote the feasible set by S = { x : gi (x) ≥ 0,

i = 1, . . . , m } ,

S 0 = { x : gi (x) > 0,

i = 1, . . . , m } .

and its interior by In developing the convergence theory, we make the following assumptions. (i) (ii) (iii) (iv)

The functions f and g1 , . . . , gm are continuous on n . The set { x : x ∈ S, f (x) ≤ α } is bounded for any finite α. The set S 0 is nonempty. S is the closure of S 0 .

17 This

subsection can be omitted from study without loss of continuity.

i

i i

i

i

i

i

614

book 2008/10/23 page 614 i

Chapter 16. Penalty and Barrier Methods

Assumptions (i) and (ii) imply that the function f has a minimum value on the set S. We denote this minimum value by f∗ . Assumption (iii) is necessary to define the barrier subproblems. Assumption (iv) is necessary to avoid situations where the minimum point is isolated and does not have neighboring interior points. As an example, consider the problem of minimizing x subject to the constraints x 2 − 1 ≥ 0 and x + 1 ≥ 0. The feasible region consists of the points { x ≥ 1 } and the isolated point x = −1. The point x = −1 is the minimizer, but because it is isolated it is not possible to approach it from the interior of the feasible region, and a barrier method could not converge to this solution. The barrier function will be of the form βμ (x) = f (x) + μφ(x), where φ can be any function that is continuous on the interior of the feasible set, and that satisfies φ(x) → ∞

as

gi (x) → 0+ .

We will show here that under mild conditions, the sequence of barrier minimizers has a convergent subsequence, and the limit of any such convergent subsequence is a solution to the problem. Although in practice, convergence of the entire sequence of minimizers is observed, from a theoretical point of view it is not always possible to guarantee convergence of the entire sequence, but only convergence of some subsequence. The following example illustrates this. Example 16.6 (Nonconvergent Sequence with Convergent Subsequence). Consider the one-variable problem minimize subject to

f (x) = −x 2 1 − x 2 ≥ 0.

2 The logarithmic barrier function is βμ (x) = −x√ − μ log(1 − x 2 ). It has a single minimizer x = 0 if μ ≥ 1, and two minimizers x = ± 1 − μ if μ < 1. (The point x = 0 is a local maximizer if μ < 1.) Suppose that μ0 , μ1 , . . . is a sequence of decreasing √ barrier parameters less than 1. Then a possible sequence of minimizers of β is xk = (−1)k 1 − μk . This sequence oscillates between neighborhoods of −1 and +1, and hence is nonconvergent. However, the subsequences { x2k } and { x2k+1 } both converge to solutions of the original constrained problem.

This example was contrived to illustrate the limitations of what can be said about a sequence of minimizers. In practice, because the solution of one subproblem is used as the starting point of the next subproblem, it is unlikely that a sequence of minimizers obtained in computation would jump back and forth in the manner described by { xk }. Rather, consecutive minimizers would likely either all be in a neighborhood of +1 (eventually) or all be in the neighborhood of −1, and the resulting sequence would converge. In the following, we assume that it is possible to compute global minimizers of the barrier function. This is true, for example, if the problem is convex (see the Exercises). Theorem 16.7. Suppose that a nonlinear inequality-constrained problem satisfies conditions (i)–(iv) above. Suppose that a sequence of unconstrained minimization problems minimize βμ (x) = f (x) + μφ(x)

i

i i

i

i

i

i

16.2. Classical Penalty and Barrier Methods

book 2008/10/23 page 615 i

615

is solved for μ taking values μ1 > μ2 > · · · > μk > · · ·, where limk→∞ μk = 0. Suppose also that the functions βμk (x) have a minimum in S 0 for each k. Let xk denote a global minimizer of βμk (x). Then (i) f (xk+1 ) ≤ f (xk ), (ii) φ(xk+1 ) ≥ φ(xk ), (iii) the sequence xk has a convergent subsequence, (iv) if { xk : k ∈ K } is any convergent subsequence of unconstrained minimizers of β, then its limit point is a global solution of the constrained problem. Proof. We prove the results in the order stated in the theorem. Only the last is of any difficulty. 1. Since xk is the minimizer of βμk (x), then βμk (xk ) ≤ βμk (xk+1 ), so f (xk ) + μk φ(xk ) ≤ f (xk+1 ) + μk φ(xk+1 ). Also, since xk+1 is the minimizer of βμk+1 (x), then βμk+1 (xk+1 ) ≤ βμk+1 (xk ), or f (xk+1 ) + μk+1 φ(xk+1 ) ≤ f (xk ) + μk+1 φ(xk ). Multiplying the first inequality by μk+1 , the second inequality by μk , adding the resulting inequalities, and reordering yields (μk − μk+1 )f (xk+1 ) ≤ (μk − μk+1 )f (xk ). Since μk > μk+1 , we conclude that f (xk+1 ) ≤ f (xk ). 2. As before, since xk is the minimizer of βμk (x), then f (xk ) + μk φ(xk ) ≤ f (xk+1 ) + μk φ(xk+1 ). Since f (xk ) ≥ f (xk+1 ) this implies that φ(xk ) ≤ φ(xk+1 ). 3. Consider the set S 1 = { x ∈ S : f (x) ≤ f (x1 ) }. The continuity of f implies that S 1 is closed, and assumption (ii) implies that it is bounded. Hence S 1 is compact. Now in view of (i), f (xk ) ≤ f (x1 ) for all k. Thus the sequence { xk } lies in the compact set S 1 , and therefore it has a convergent subsequence in S 1 , and thus also in S. 4. Let { xk : k ∈ K } be a convergent subsequence of { xk }, and let xˆ be its limit point. Since gi (xk ) > 0 for all k, gi (x) ˆ ≥ 0, and hence xˆ is feasible to the constrained problem. Let f∗ be the minimum value of f in the feasible region. We will show that f (x) ˆ = f∗ by contradiction, assuming that f (x) ˆ > f∗ .

(16.4)

i

i i

i

i

i

i

616

book 2008/10/23 page 616 i

Chapter 16. Penalty and Barrier Methods It follows from (16.4) and assumption (iv) that there exists some strictly feasible point y ∈ S 0 such that f (y) < f (x). ˆ Denote  = f (x) ˆ − f (y); then  > 0. Because f is continuous, it holds that lim f (xk ) = f (x), ˆ

k∈K k→∞

and thus for sufficiently large k ∈ K we have f (y) + 12  < f (xk ).

(16.5)

Also, because xk is a minimizer of βμk () we have f (xk ) + μk φ(xk ) ≤ f (y) + μk φ(y).

(16.6)

We consider now two cases. (i) xˆ is strictly feasible. Then for large enough k ∈ K, xk is strictly feasible, and therefore φ(xk ) is bounded. Also, because y is strictly feasible, φ(y) is bounded. Therefore, for k sufficiently large, − 18  ≤ μk φ(xk )

and

μk φ(y) ≤ 18 .

Combining this with (16.6) yields f (xk ) − 18  ≤ f (y) + 18  or f (xk ) ≤ f (y) + 14 . But this is a contradiction to (16.5), and therefore to (16.4). (ii) xˆ is not strictly feasible. It follows from (16.5) that f (y) < f (xk ). Adding this to (16.6), rearranging, and dividing by μk gives φ(xk ) < φ(y). Because y is strictly feasible, the right-hand side is finite. Nevertheless, because xk approaches the boundary, the left-hand side is unbounded above as k tends to ∞. We therefore have a contradiction to (16.4).

A key assumption in the theorem is that the barrier functions have a minimizer. We now state conditions that guarantee this.

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 617 i

617

Lemma 16.8. Assume that the set S is compact. Then for any fixed positive value μ there exists a point x(μ) ∈ S 0 that minimizes βμ (x). Proof. Let x0 be any point in S 0 , and define the set

W = x ∈ S 0 : βμ (x) ≤ βμ (x0 ) = β0 . Because S is compact, W is bounded. We now show that W is also closed; that is, it contains all its limits points.

Let wj be any convergent sequence in W with limit point w. ˆ Since wj ⊂ S and S is compact, then wˆ ∈ S. Now if wˆ were on the boundary of S (that is, some gi (w) ˆ = 0), then limj →∞ βμ (wj ) = ∞, which contradicts the fact that wj ∈ W . Thus wˆ ∈ S 0 . Now because wj ∈ W , it follows that βμ (wj ) ≤ β0 for all j . The continuity of β in S 0 implies that βμ (w) ˆ ≤ β0 also. Thus wˆ ∈ W . Therefore W contains all its limit points, and hence it is closed. Because it is also bounded, W is compact. Since β is continuous on the compact set W , it attains its global minimum x(μ) in W . But by definition, the value of β at any point in S that is not in W must be larger than β0 , and in turn, larger than the minimum value βμ (x(μ)). Thus x(μ) is the global minimizer of β in S. Another case where the barrier minimizers always exist is when the problem is convex. This is true even if the feasible region is unbounded. A proof can be found in the book by Fiacco and McCormick (1968, reprinted 1990). Theorem 16.7 shows that a subsequence of global minimizers of the barrier function converges to a global minimum of the constrained problem. It is also possible to prove convergence to a local minimum of the constrained problem if additional assumptions are made. In practice, if started close to some local solution, it is likely that consecutive minimizers of the barrier functions will naturally satisfy these conditions, and that the sequence of barrier minimizers will therefore have a limit. It is not true that every limit point of a sequence of local minimizers of the barrier function is a constrained minimizer. (See the Exercises.)

Exercises 2.1. Consider the problem minimize

f (x) = 12 x12 + 12 x22

subject to

x1 + x2 ≥ 1.

Suppose that the logarithmic barrier method is used to solve this problem. (i) What is x(μ)? What is λ(μ)? What is x∗ ? What is λ∗ ? (ii) Compute the Hessian matrix B of the logarithmic barrier function for μ = 10−4 . What is the condition number of B? What is B −1 ?

i

i i

i

i

i

i

618

book 2008/10/23 page 618 i

Chapter 16. Penalty and Barrier Methods

2.2. Repeat Exercise 2.1 for minimize subject to

f (x) = x1 + x2 x1 ≥ 0 x2 ≥ 0.

This example illustrates that if an n-variable problem has n constraints in the optimal active set, then the barrier method does not introduce ill-conditioning. 2.3. Repeat Exercise 2.1 for maximize subject to

f (x) = x1 + x2 x1 ≥ 0 x2 ≥ 0 x1 + x2 ≤ 1.

2.4. (Due to Powell (1972).) Consider the one-dimensional problem minimize subject to

−1 x2 + 1 x ≥ 1.

Show that the logarithmic barrier function is unbounded below in the feasible region. Show also that the logarithmic barrier function has a local minimizer that approaches the solution x∗ = 1 as μ → 0. 2.5. For barrier methods, we assume that it is possible to reach any boundary point of the feasible region by approaching it from the interior. Give three examples of feasible regions that violate this assumption. 2.6. (Due to Fiacco (1973) and Wright (1992).) Consider the problem minimize subject to

f (x) = x x2 ≥ 0 x ≥ −1.

Prove that the sequence of global minimizers of the logarithmic barrier function converges to the constrained global minimizer x = −1, but that the sequence of local, but nonglobal, minimizers converges to 0, which is not a constrained minimizer. 2.7. Show how to use a two-phase approach to obtain an initial feasible point for a barrier method. 2.8. Suppose that f is bounded below in the feasible region. Prove that if βμ0 (x) is bounded from below in S 0 , then so is βμ (x) for all μ such that 0 < μ < μ0 .

16.3

Ill-Conditioning

We now analyze the structure of the Hessian matrix of the barrier function and show that as μ decreases, the Hessian matrix becomes increasingly ill conditioned. Although our discussion will focus on the logarithmic barrier function method, the same results are true in general for other barrier and penalty methods. This ill-conditioning is the main reason that classical barrier and penalty methods were abandoned in the early 1970s. In Section 16.4

i

i i

i

i

i

i

16.4. Stabilized Penalty and Barrier Methods

book 2008/10/23 page 619 i

619

we show how to overcome this ill-conditioning by deriving numerically stable formulas for the Newton direction in a barrier method. The logarithmic barrier method attempts to solve the constrained problem by solving a sequence of unconstrained problems of the form minimize βμ (x) = f (x) − μ

m

log(gi (x))

i=1

for a sequence of positive barrier parameters μ which decrease to zero. The ill-conditioning can be observed by examining the formulas for the Hessian matrix of β. They are ∇x β = ∇f − μ

m

∇gi i=1 m

2 ∇xx β = ∇ 2f − μ

i=1

gi m

∇ 2 gi ∇gi ∇gi T +μ , gi gi 2 i=1

where we have written f in place of f (x), etc. Let x(μ) be an unconstrained minimizer of βμ (x), and let λi = μ/gi (x(μ)) be the associated Lagrange multiplier estimate. The formulas for the gradient and Hessian matrix can be rewritten as ∇x β = ∇f −

m

λi ∇gi

i=1 m

2 ∇xx β = ∇ 2f −

i=1

1 2 λ ∇gi ∇gi T. μ i=1 i m

λ i ∇ 2 gi +

Notice that the gradient is an approximation to the gradient of the Lagrangian at  the optimum. 2 Let us inspect the expression for the Hessian matrix. The term ∇ 2 f − m i=1 λi ∇ gi is an approximation to the Hessian matrix of the Lagrangian of the problem. In general, its condition number reflects the conditioning of the Lagrangian Hessian for the original constrained problem. Ill-conditioning in the barrier function arises because of the final term in the Hessian matrix. If a constraint is binding at the solution of the constrained problem (and its corresponding Lagrange multiplier is not zero), then the ratio λ2i /μ tends to infinity as μ approaches zero. As a result, the Hessian matrix in general becomes increasingly ill conditioned as the solution is approached. This structural ill-conditioning occurs even when the underlying constrained problem is well conditioned.

16.4

Stabilized Penalty and Barrier Methods18

Despite the ill-conditioning of the Hessian matrix of the barrier function, it is still possible to compute a Newton-type direction in a numerically stable manner. We show how to do 18 This

section can be omitted from study without loss of continuity.

i

i i

i

i

i

i

620

book 2008/10/23 page 620 i

Chapter 16. Penalty and Barrier Methods

this for the logarithmic barrier function applied to the problem minimize subject to

f (x) g(x) ≥ 0.

The results can be extended to other penalty and barrier methods. The ill-conditioning is avoided by using an approximate formula for the Newton direction for the barrier problem. This formula becomes more accurate as the barrier parameter goes to zero, that is, as the ill-conditioning becomes more severe. For simplicity, we assume that all the constraints are binding at the solution, and that all of these constraints have positive Lagrange multipliers. In practice, there is likely to be a mix of binding and nonbinding constraints, and in that case the techniques that we describe would be applied only to the binding constraints. Our approach is to separate the Newton direction into two components, one in the null space and one in the range space of the constraint gradients. We show that approximations to both these components can be computed in a stable manner. Let A = ∇g(x)T be the Jacobian matrix of the constraints, and assume that A has full rank. Let Z be a basis matrix for the null space of A, and let Ar be a right-inverse matrix for A. We assume that Z and Ar have been obtained from an orthogonal QR factorization (see Section 3.3.4), so that  T Z = I. ( Z AT ) ATr We also define the Lagrange multiplier estimates λi = μ/gi (x) and the diagonal matrix 2 D, whose ith diagonal entry is λi 2 . Finally, let B = ∇xx β be the Hessian of the barrier function. With these definitions, we obtain B=

2 ∇xx β

1 2 1 =∇ f − λ i ∇ gi + λi ∇gi ∇gi T = H + ATDA, μ μ i=1 i=1 2

m

m

2

where H = ∇ 2f −

m

λi ∇ 2 g i

i=1

is the Hessian matrix of the Lagrangian. From the identity  B = I BI = ( Z we obtain B

−1

T

A ) 

= (Z

Ar )

ZT ATr

Z TBZ ATrBZ



 B (Z

Z TBAr ATrBAr

Ar ) −1 

ZT A

ZT ATr

 ,

 .

To compute the search direction, we approximate the inverse of the middle matrix on the right-hand side.

i

i i

i

i

i

i

16.4. Stabilized Penalty and Barrier Methods

book 2008/10/23 page 621 i

621

To find an explicit expression for this inverse matrix, we use the bordered-inverse formula: If A1 and A3 are symmetric matrices, then 

A1 AT2

A2 A3

−1

 =  =

where

−1 −1 T −1 A−1 1 + A 1 A2 G A2 A1

A−1 1 0

−G−1 AT2 A−1 1 G−1

−1 −A−1 1 A2 G   −1  A1 A2 0 + G−1 ( AT2 A−1 1 0 −I



−I ) ,

G = (A3 − AT2 A−1 1 A2 ).

Applying this formula, and noting that AZ = 0, gives   T (Z H Z)−1 0 B −1 = ( Z Ar ) 0 0  T  (Z H Z)−1 Z TH Ar + G−1 ( ATrH Z(Z TH Z)−1 −I where G=

 −I )

ZT ATr

 ,

1 D + ATrH Ar − ATrH Z(Z TH Z)−1 Z TH Ar . μ

When μ is small (that is, as we approach the solution where the ill-conditioning becomes apparent), G−1 ≈ μD −1 . Hence B −1 ≈ Z(Z TH Z)−1 Z T + μ(Z(Z TH Z)−1 Z TH − I )Ar D −1 ATr(H Z(Z TH Z)−1 Z T − I ). This approximation to B −1 determines an approximation to the Newton direction p = B −1 ∇x β. It is straightforward to show that p = B −1 ∇x β ≈ p1 + μp2 , where p1 = −Z(Z TH Z)−1 Z T∇x β, λ = ATr(Hp1 + ∇x β), p2 = (Z(Z TH Z)−1 Z TH − I )Ar D −1 λ. The main point to notice here is that to compute an approximate Newton direction, the only matrix inverse required is that of Z TH Z. This matrix has no structural ill-conditioning, that is, no ill-conditioning due to the presence of the barrier parameter. The matrix Z TH Z appears twice in these formulas. This inverse matrix should not be formed. Instead a factorization should be computed. This factorization need only be computed once; backsubstitution can be used to compute p1 and p2 . As μ → 0, it can be shown that the error in the approximate search direction is O(μ); see the references in the Notes.

i

i i

i

i

i

i

622

book 2008/10/23 page 622 i

Chapter 16. Penalty and Barrier Methods

Example 16.9 (Stabilized Formulas). Consider the problem from Example 16.2 with the nonbinding constraint removed: minimize subject to

f (x) = x12 + x22 g(x) = x1 − 1 ≥ 0.

The corresponding barrier problem is minimize βμ (x) = x12 + x22 − μ log(x1 − 1). If we set μ = 10−4 and x = (1.001, 0.001)T, then the multiplier estimate is λ = μ/(x1 − 1) = 0.1. At this point,     1.902 2x1 − μ/(x1 − 1) ∇x β = = 0.002 2x2     2 102 0 2 + μ/(x1 − 1) 0 2 . B = ∇xx = β= 0 2 0 2 Then cond(B) = 50.1. The Newton direction is   −0.0186 −1 p = −B b = . −0.0010 We now determine the approximate Newton direction. For this problem,   2 0 and A = ( 1 0 ) . H = 0 2 Hence Ar =

  1 , 0

Z=

  0 , 1

and

Z TH Z = ( 2 ) .

Now cond(Z TH Z) = 1. The diagonal matrix is D = (λ2 ) = (0.01). From these we determine   0 T −1 T p1 = −Z(Z H Z) Z ∇x β = −0.001 T λ = Ar (Hp1 + ∇x β) = ( 1.902 )   −190.2 . p2 = (Z(Z TH Z)−1 Z TH − I )Ar D −1 λ = 0 The approximate Newton direction is p¯ = p1 + μp2 =

is



−0.0190 −0.0010

 .

The difference between the Newton direction and the approximation Newton direction   4 × 10−4 p − p¯ = . 0

This is as expected, since the theory predicts that this difference will be proportional to μ = 10−4 .

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 623 i

623

If the matrix Z TH Z is positive definite at the point x, then these formulas will produce a descent direction provided that the barrier parameter μ is sufficiently small. If Z TH Z is not positive definite, it is still possible to compute a descent direction by modifying the Hessian matrix (see Section 11.4).

Exercises 4.1. For Exercise 2.1, compute Z TH Z. Note that the only inverse matrix required in the stabilized formulas is that of Z TH Z. 4.2. Verify the formulas for the first and second derivatives of the barrier function in Section 16.3. 4.3. Verify the expressions for B −1 . 4.4. Verify the bordered-inverse formula.

16.5

Exact Penalty Methods

Barrier methods and penalty methods both solve a constrained problem by solving a sequence of unconstrained problems. In general, a sequence of unconstrained optima will approach the solution of the constrained problem, but will not attain it exactly, even if exact arithmetic is used. Is it possible to obtain the exact solution of a constrained problem by solving a finite number of unconstrained problems? Or better still, is it possible to obtain the exact solution of a constrained problem by solving a single unconstrained problem? In this section we present a family of methods that achieve these goals. These methods are called exact penalty methods because they make it possible to solve the constrained problem exactly for a finite positive penalty parameter. To illustrate these methods, we consider a problem with both equality and inequality constraints: minimize f (x) subject to gi (x) = 0, i ∈ E gi (x) ≥ 0, i ∈ I. We assume that the objective function f and the constraint functions gi are continuous. Consider the penalty function



|gi (x)| + ρ | min(0, gi (x))| πρ (x) = f (x) + ρ i∈E

= f (x) + ρ

i∈E

i∈I

|gi (x)| − ρ



min(0, gi (x)).

i∈I

The penalty imposed for violating a constraint is simply the absolute value of the violation. The function π is continuous, but it is not differentiable at all points. This penalty function is sometimes called the 1 exact penalty function, because the penalty term is the 1 -norm (1-norm) of the constraint violations.

i

i i

i

i

i

i

624

book 2008/10/23 page 624 i

Chapter 16. Penalty and Barrier Methods ρ = .25

ρ = .75

1.2 x2

1.2 x2

1

1

0.8

0.8

0.6

0.6

0.4

0.4

0.2

0.2

−0.5

0

0.5

1

1.5

x1

−0.5

0

0.5

1

1.5

x1

Figure 16.3. Exact penalty function. Example 16.10 (Exact Penalty Method). Consider the problem minimize

f (x) = 12 (x1 − x2 )2 + 12 x22

subject to

x1 ≥ 1.

This problem has a unique minimizer x1 = 1, x2 = 12 , with a corresponding Lagrange multiplier λ = 12 . Let us use the exact 1 penalty function to solve the problem. The penalty function is πρ (x) = 12 (x1 − x2 )2 + 12 x22 − ρ min(0, x1 − 1). This function is not differentiable when x1 = 1. It will be convenient to write π in the form πρ (x) = ( 12 x1 − x2 )2 + ( 14 x12 − ρ min(0, x1 − 1)). Then the minimum of π is obtained at a point where x2 = 12 x1 , and where x1 minimizes the function defined by 1 x 2 − ρ(x1 − 1) if x1 < 1 4 1 1 2 x 4 1

if x1 ≥ 1.

This function is graphed in Figure 16.3 for two values of ρ. When ρ ≤ 12 , the left branch of this function is decreasing for x1 ≤ 2ρ and then increasing for 2ρ ≤ x1 ≤ 1. At this point it meets the right branch of the function which also increases. When ρ > 12 , the left branch of the function is decreasing for x1 ≤ 1, and the right branch is increasing for x1 ≥ 1. Hence, for any ρ > 12 , x1 = 1 is the minimizer of the function. In turn this yields x2 = 12 . Thus, for any ρ > 12 , the solution x∗ is also a minimizer of the penalty function. The following lemma shows that, for a large-enough penalty parameter, the minimizer of the penalty function also solves the constrained minimization problem. Lemma 16.11. Let (x∗ , λ∗ ) be a solution to the constrained optimization problem. Assume that the second-order sufficiency conditions are satisfied, and that λ∗  ≤ M for some constant M. There exists a ρ¯ such that if ρ ≥ ρ, ¯ then x∗ is also a local minimizer of πρ (x).

i

i i

i

i

i

i

16.5. Exact Penalty Methods

book 2008/10/23 page 625 i

625

Proof. We prove the result in the case when only equality constraints are present; the remainder of the proof is left to the Exercises. The proof is based on ideas from sensitivity analysis. Let h be some vector, with h “small,” and consider the perturbed optimization problem minimize subject to

f (x) g(x) = h.

Let F (h) be the optimal objective value. Then F (h) = F (0) + hT∇F (ξ ) = f (x∗ ) + hT∇F (ξ ), where ξ  ≤ h. We now examine the penalty function:

min πρ (x) = min f (x) + ρ |gi (x)| x x .

|hi | : gi (x) = hi = min f (x) + ρ x,h

= min F (h) + ρ |hi |. h

 We now show that F (h)+ρ |hi | > F (0) if h = 0 and ρ is large. Since F (0) = πρ (x∗ ) = f (x∗ ), this will prove the lemma. Using the Taylor series expansion, we obtain F (h) + ρ



|hi | = f (x∗ ) + hT∇F (ξ ) + ρ



|hi |.

Let  be some small positive number. Since ∇F (0) = λ (see, for example, the book by Luenberger (1984)) and ξ  < h, we can guarantee that |(∇F (ξ ))i | < |λi | +  if h is sufficiently small. Hence  

hT∇F (ξ ) ≥ − max { |(∇F (ξ ))i | } |hi |  i 

≥ − max { |λi | +  } |hi |. i

ˆ be the largest Lagrange multiplier in absolute value. Then Let |λ| F (h) + ρ



ˆ − ) |hi | ≥ f (x∗ ) + (ρ − |λ|



|hi |.

If ρ > |λˆ + |, then this is greater than f (x∗ ). Since this is true for all  > 0, the lemma is ˆ true with ρ¯ = |λ|. Optimization methods such as Newton’s method use the derivatives of the problem functions. They cannot be applied directly to this exact penalty function, since it is not differentiable at all points. So, even though it improves on classical penalty methods by allowing the penalty parameter to remain bounded, it has its own deficiencies.

i

i i

i

i

i

i

626

book 2008/10/23 page 626 i

Chapter 16. Penalty and Barrier Methods

In the next section we will derive a differentiable exact penalty function, but it too will not be free of complications.

Exercises 5.1. Apply an exact penalty method to minimize

f (x) = 13 x 3 − x

subject to

x = 1.

Find the minimizer of the penalty function for any penalty parameter ρ. Determine the critical value of the paramter ρ¯ that guarantees that, for any ρ ≥ ρ, ¯ the problem can be solved via a single subproblem. 5.2. Consider the linear programming problem minimize

f (x) = cTx

subject to

Ax = b x ≥ 0.

(i) Find the dual problem. (ii) Suppose that there is no known initial feasible solution to this problem. A common technique is to add (nonnegative) artificial variables to the equality constraints and use a big-M method to solve the problem. On paper, if the problem is solved by the simplex method, one can treat “M” as a symbol. In practice, a value of M must be specified. How large must M be? Show that it is sufficient to choose M ≥ max { |yi | }, where y is the vector of dual variables corresponding to the equality constraints. You may assume that the original linear program has a unique optimal solution. (iii) Show also that the big-M method may be viewed as an exact penalty method, and indicate how the results above confirm the theory of exact penalty methods. 5.3. Complete the proof of Lemma 16.11 by showing that the result is also true if inequality constraints are present.

16.6

Multiplier-Based Methods

The ill-conditioning of penalty methods can be ameliorated by including multipliers explicitly in the penalty function. This complicates the algorithms, because both the variables x and the multipliers λ must be updated, but in exchange it offers the possibility of more rapid rates of convergence. Of course, multipliers appear in the context of the classical penalty method, but in that case they are a by-product of the method. For example, in the classical penalty method, the multiplier estimate is λ = −ρg(x), where g is the vector of constraint functions. These multiplier estimates are used in the termination tests, as well as for sensitivity analysis. But multiplier estimates can be used

i

i i

i

i

i

i

16.6. Multiplier-Based Methods

book 2008/10/23 page 627 i

627

in a more active way to drive an optimization algorithm. We examine this idea in this section. Let us begin by examining problems of the form minimize subject to

f (x) g(x) = 0,

where g is a vector-valued function. As was pointed out in Section 14.6, the solution x∗ to this problem is a stationary point of the Lagrangian function, but is a minimizer of this function if x is restricted to be feasible. Thus x∗ solves minimize

L(x, λ) = f (x) − λTg(x)

subject to

g(x) = 0.

If penalty terms are added to the Lagrangian, then it might be possible to make x∗ an unconstrained minimizer of this penalized Lagrangian function. For example, it might be possible to solve minimize Aρ (x, λ) = f (x) − λTg(x) + 12 ρg(x)Tg(x) x

to obtain x∗ . This is referred to as an augmented Lagrangian method because it is based on minimizing an augmented Lagrangian function. A simple augmented Lagrangian method has the following form: Values of x0 , λ0 , and ρ0 > 0 are chosen to initialize the method. Then for k = 0, 1, . . . do the following: 1. The Optimality Test—If ∇L(xk , λk ) = 0, then stop. 2. The Unconstrained Subproblem—Compute xk+1 by solving minimize Aρk (x, λk ) = f (x) − λTkg(x) + 12 ρk g(x)Tg(x) x

using any of our unconstrained optimization methods. 3. The Update—Determine λk+1 and ρk+1 . For example, for the multiplier update we could use λk+1 = λk − ρk g(xk+1 ). The new penalty parameter should be chosen so that ρk+1 ≥ ρk . The final step requires comment. If xk+1 minimizes Aρk (x, λk ), then ∇x Aρk (xk+1 , λk ) = 0 or ∇f (xk+1 ) − ∇g(xk+1 )λk + ρk ∇g(xk+1 )g(xk+1 ) = 0. This can be rearranged as ∇f (xk+1 ) − ∇g(xk+1 )[λk − ρg(xk+1 )] = 0. If we define λk+1 = λk − ρk g(xk+1 ), then ∇x L(xk+1 , λk+1 ) = ∇f (xk+1 ) − ∇g(xk+1 )λk+1 = 0;

i

i i

i

i

i

i

628

book 2008/10/23 page 628 i

Chapter 16. Penalty and Barrier Methods

that is, the optimality conditions for the constrained problem are partially satisfied. The algorithm will terminate when ∇λ L(xk+1 , λk+1 ) = −g(xk+1 ) = 0, that is, when feasibility has been achieved. The update step also selects ρk+1 . This parameter should be “large enough” so that the augmented Lagrangian function has a local minimizer in x. If ρ is too small, then the unconstrained subproblem may not have a solution. (See the Exercises.) If a failure is detected when attempting to solve this subproblem, then ρ should be increased. Software for these methods often includes elaborate rules for updating ρ. Example 16.12 (Augmented Lagrangian Method). We apply the augmented Lagrangian method to the problem in Example 15.8: minimize

f (x1 , x2 ) = e3x1 + e−4x2

subject to

g(x1 , x2 ) = x12 + x22 − 1 = 0.

The solution to this problem is x∗ = (−0.74834, 0.66332)T with λ∗ ≈ −0.21233. The augmented Lagrangian function is Aρ (x, λ) = e3x1 + e−4x2 − λ(x12 + x22 − 1) + 12 ρ(x12 + x22 − 1)2 . We again use the initial guess x0 = (−1, 1)T, together with λ0 = −1. The penalty parameter will be kept constant: ρ0 = ρk = 10. At the initial point     3e3x1 0.14936 ∇f = = −0.07326 −4e−4x2     3x1 0.44808 0 9e 0 ∇ 2f = = 0 0.29305 0 16e−4x2 g = x12 + x22 − 1 = ( 1 )     −2 2x1 , = ∇g = 2 2x2

 ∇ 2g =

2 0

0 2

 .

We use Newton’s method to solve the unconstrained subproblem. For simplicity, we use the classical method, without a line search, so that 2 x ← x − (∇xx A)−1 (∇x A).

For x = x0 ,  ∇x A =

−21.851 21.927 

and x←

−1 1



 and



 −

2 ∇xx A=

−0.21138 0.21626



62.448 −40.000

 =

−40.000 62.293

−0.78862 0.78374



 .

i

i i

i

i

i

i

16.6. Multiplier-Based Methods

book 2008/10/23 page 629 i

629

Table 16.2. Augmented Lagrangian method. k 0 1 2 3 4 5 6

xk −1.00000 −0.71795 −0.74719 −0.74830 −0.74833 −0.74834 −0.74834

1.00000 0.63937 0.66242 0.66329 0.66332 0.66332 0.66332

λk

∇x L

g

−1.000000 −0.242431 −0.213381 −0.212362 −0.212326 −0.212325 −0.212325

3 × 100 6 × 10−12 1 × 10−15 7 × 10−10 2 × 10−15 2 × 10−10 2 × 10−13

1 × 100 8 × 10−2 3 × 10−3 1 × 10−4 4 × 10−6 1 × 10−7 4 × 10−9

At this point ∇x A = 7.1533. We continue using Newton’s method until ∇x A < 10−9 , obtaining the successive iterates     −0.70887 −0.70745 , , 0.65110 0.68719

 ···

−0.71795 0.63937

 .

This final point is x1 . (Even though no line search is used, the iteration converges to a local minimizer of the augmented Lagrangian function in this case.) To complete an iteration of the augmented Lagrangian method we update the Lagrange multiplier estimate: λ1 = λ0 − ρ0 g(x1 ) = −1 − 10(−0.075757) = −0.24243. Now the whole process repeats at the new point. The complete iteration is summarized in Table 16.2. From the first iteration to the last iteration, the optimality condition is almost satisfied. This is a consequence of the update formula for the Lagrange multiplier. (The optimality condition is not exactly satisfied because the unconstrained subproblems are not solved exactly.) We now establish some basic properties of the augmented Lagrangian function. Assume that x∗ is a regular point, and let λ∗ be the vector of Lagrange multipliers at x∗ . For any ρ > 0, Aρ (x∗ , λ∗ ) = f (x∗ ) − λ∗ Tg(x∗ ) + 12 ρg(x∗ )Tg(x∗ ) = f (x∗ ), since the solution must be a feasible point (that is, g(x∗ ) = 0). This shows that the objective function and the augmented Lagrangian function have the same value at the solution. In addition, ∇x Aρ (x∗ , λ∗ ) = ∇f (x∗ ) − ∇g(x∗ )λ∗ + ρ∇g(x∗ )g(x∗ ) = ∇f (x∗ ) − ∇g(x∗ )λ∗ = 0. Hence the gradient of the augmented Lagrangian is equal to the gradient of the Lagrangian and vanishes as the solution. It is also possible to show that the Hessian matrix of the augmented Lagrangian is positive definite under reasonable conditions.

i

i i

i

i

i

i

630

book 2008/10/23 page 630 i

Chapter 16. Penalty and Barrier Methods

Lemma 16.13 (Hessian Matrix of Augmented Lagrangian). Let (x∗ , λ∗ ) be a solution to the constrained optimization problem minimize

f (x)

subject to

g(x) = 0.

Assume that the second-order sufficiency conditions are satisfied at (x∗ , λ∗ ) and that x∗ is a 2 regular point of the constraints. Then ∇xx Aρ (x∗ , λ∗ ) is positive definite for all ρ ≥ ρ, ¯ for some value ρ. ¯ 2 Proof. We prove that x T∇xx Aρ (x∗ , λ∗ )x > 0 for x = 0 and ρ sufficiently large. To simplify 2 L(x∗ , λ∗ ) and A = ∇g(x∗ )T. Then the proof, we denote H = ∇xx 2 ∇xx Aρ (x∗ , λ∗ ) = H + ρATA.

Any x can be written as x = Zv + q, where Z is a basis matrix for the null space of A and q is in the range of AT. (See Section 3.2.) If x = 0, then v and q cannot both be zero. We now test if the Hessian matrix of the augmented Lagrangian function is positive definite (using the fact that AZ = 0): 2 x T∇xx Aρ (x∗ , λ∗ )x = (Zv + q)T(H + ρATA)(Zv + q) = v T(Z TH Z)v + 2v TZ TH q + q TH q + ρq TATAq.

Let α be the smallest eigenvalue of Z TH Z; because of the second-order sufficiency condition, α > 0. Also, let β = Z, γ = H , and let δ be the smallest nonzero eigenvalue of ATA. Note that δ > 0. Then (see the Exercises) 2 x T∇xx Aρ (x∗ , λ∗ )x ≥ α v2 − 2βγ v q + (ρδ − γ ) q2 .

This final result will be positive if 1 ρ> δ



β 2γ 2 +γ α



(see the Exercises). This proves that the Hessian matrix is positive definite for sufficiently large ρ, and the right-hand side of this inequality determines ρ. ¯ The lemma shows that, under the above conditions, the Hessian matrix of the augmented Lagrangian is positive definite for ρ ≥ ρ¯ at a local solution to the constrained optimization problem. Since the functions f and g are twice continuously differentiable, the result is also true for x ≈ x∗ and λ ≈ λ∗ , although a larger value of ρ¯ might have to be used. At a local solution to the constrained problem, the gradient of the augmented Lagrangian is zero. If the Hessian matrix of the augmented Lagrangian is positive definite at this point, then this local solution is a local minimizer of the augmented Lagrangian function. Thus the solution to the constrained problem can be found using a single unconstrained minimization of the augmented Lagrangian function if ρ ≥ ρ¯ and if λ = λ∗ . Thus the augmented Lagrangian function is an exact penalty function (see Section 16.5). Unlike

i

i i

i

i

i

i

16.6. Multiplier-Based Methods

book 2008/10/23 page 631 i

631

a classical penalty method where the penalty parameter must tend to infinity, an augmented Lagrangian method can maintain ρ at some fixed, sufficiently large value. This ameliorates some of the ill-conditioning associated with penalty methods. This lemma assumes that λ = λ∗ , that is, the optimal Lagrange multipliers are known. This will not normally be true. If only an estimate of the multipliers is provided, then progress towards a solution can still be guaranteed if the penalty parameter is large enough. This is the topic of the next theorem. The theorem shows that the progress of the algorithm is controlled by the accuracy of the multiplier estimates, in the sense that the accuracy of λ at the current iteration determines the accuracy of both x and λ at the next iteration. For this reason, an augmented Lagrangian method is sometimes referred to as a method of multipliers. Theorem 16.14 (Local Convergence of Augmented Lagrangian Method). Assume that the second-order sufficiency conditions are satisfied for minimize f (x) subject to g(x) = 0. 2 Let ρ¯ > 0 be large enough so that ∇xx Aρ¯ (x∗ , λ∗ ) is positive definite. Then there exist positive constants δ, , and M such that

(i) for all (λ, ρ) ∈ D ≡ { (λ, ρ) : λ − λ∗  < δρ, ρ ≥ ρ¯ } the problem minimizex Aρ (x, λ) subject to x − x∗  ≤  has a unique solution x(λ, ρ). The function x(λ, ρ) is continuously differentiable in the interior of D, and for all (λ, ρ) ∈ D, x(λ, ρ) − x∗  ≤ (ii) for all (λ, ρ) ∈ D, λ+ (λ, ρ) − λ∗  ≤

M λ − λ∗  ; ρ M λ − λ∗  , ρ

where λ+ (λ, ρ) = λ − ρg(x(λ, ρ)) are the updated multipliers; 2 Aρ (x(λ, ρ), λ) is positive definite, and ∇g(x(λ, ρ)) has full (iii) for all (λ, ρ) ∈ D, ∇xx rank.

Proof. There are two major steps in the proof. In the first step, we examine the governing equations for an augmented Lagrangian method. We make a change of variables so that the implicit function theorem can be applied to them, and we conclude that a solution to these ¯ Most of the conclusions in the theorem follow equations exists for λ ≈ λ∗ and for ρ ≥ ρ. from this step, with the exception of the bounds on x(λ, ρ) − x∗  and λ+ (λ, ρ) − λ∗ .

i

i i

i

i

i

i

632

book 2008/10/23 page 632 i

Chapter 16. Penalty and Barrier Methods

The second step establishes these bounds by analyzing the first-order terms in Taylor series expansions of x(λ, ρ) and λ+ (λ, ρ). This step requires a number of minor technical arguments. 1. Use of the Implicit Function Theorem: Let ρ ≥ ρ, ¯ let x be a local minimizer of the augmented Lagrangian function for a given λ and ρ, and let λ+ be the new vector of Lagrange multipliers. (The local minimizer x will exist for λ ≈ λ∗ ; see the remarks after Lemma 16.13.) Then ∇f (x) − ∇g(x)λ+ = 0 1 (λ − λ+ ) − g(x) = 0. ρ (The first equation comes from the optimality of x, and the second is a rearrangement of the update formula for the multipliers.) We make a change of variables: ζ ≡ (λ − λ∗ )/ρ and μ = 1/ρ. (If ρ is large and if λ ≈ λ∗ , then both ζ and μ will be near zero.) The equations become ∇f (x) − ∇g(x)λ+ = 0 ζ + μ(λ∗ − λ+ ) − g(x) = 0. This is a system of n + m equations in the n + m unknowns x and λ+ . The system has the solution x = x∗ and λ+ = λ∗ at ζ = 0, μ = 0. We differentiate with respect to x and λ+ and evaluate the resulting Jacobian at this solution:   2 ∇xx L(x∗ , λ∗ ) −∇g(x∗ ) . −∇g(x∗ )T −μI This matrix is invertible for 0 ≤ μ ≤ 1/ρ¯ (see the Exercises). Hence by the implicit ˆ function theorem (see Appendix B.9) this system has a unique solution x(ζ, ˆ μ), λ(ζ, μ) at nearby points: There exist positive constants  and δ such that ˆ ∇f (x(ζ, ˆ μ)) − ∇g(x(ζ, ˆ μ))λ(ζ, μ) = 0 ˆ ˆ μ)) = 0 ζ + μ(λ∗ − λ(ζ, μ)) − g(x(ζ,

(16.7)

for 0 ≤ μ ≤ 1/ρ¯ and ζ  ≤ δ, with ) 2  2   ˆ x(ζ, μ) − λ∗  < . ˆ μ) − x∗  + λ(ζ, ˆ In addition, x(ζ, ˆ μ) and λ(ζ, μ) are continuously differentiable with respect to ζ and μ. We can choose δ and  sufficiently small so that ∇g(x(ζ, ˆ μ)) has full rank and 2 ˆ Aρ (x(ζ, ˆ μ), λ(ζ, μ)) is positive definite. ∇xx If we now reverse the change of variables, the same conclusions apply to the implicit solutions x(λ, ρ) and λ+ (λ, ρ). These conclusions are sufficient to prove all the results in the theorem, with the exception of the bounds on x(λ, ρ) − x∗  and λ+ (λ, ρ) − λ∗ . ˆ 2. Bounds on the Errors: We derive Taylor series expansions for x(ζ, ˆ μ) and λ(ζ, μ). To do this, we require formulas for their Jacobians. To obtain these, we differentiate (16.7) with respect to ζ and μ and rearrange: T    x(ζ, ˆ μ) 0 0 ∇ ˆ , = A(ζ, μ) ˆ λ(ζ, μ) −I λ(ζ, μ) − λ∗

i

i i

i

i

i

i

16.6. Multiplier-Based Methods where

 A(ζ, μ) =

book 2008/10/23 page 633 i

633

2 ˆ ∇xx L(x(ζ, ˆ μ), λ(ζ, μ)) −∇g(x(ζ, ˆ μ))

−∇g(x(ζ, ˆ μ))T

−1

−μI

.

We expand in a Taylor series about ζ = 0 and μ = 0. At this point x(0, ˆ 0) = x∗ and ˆ 0) = λ∗ . Using the remainder form of the Taylor series for each component, we obtain λ(0,        ζ 0 0 x(ζ, ˆ μ) − x∗ = A(η ζ, η μ) , (16.8) j j ˆ j ζ, ηj μ) − λ∗ ˆ μ j −I λ(η λ(ζ, μ) − λ∗ j where 0 ≤ ηj ≤ 1. Bounds on the errors are obtained by  taking norms  and using equation (16.8). If δ is sufficiently small, and if ζ  ≤ δ, then A(ηj ζ, ηj μ) ≤ C for some constant C. Now pick δ so that Cδ < 1, and pick μ < δ. Then from (16.8), ) 2  5 4  2   ˆ  ˆ x(ζ, ημ) − λ∗  . (16.9) μ) − λ∗  ≤ C ζ  + μ max λ(ηζ, ˆ μ) − x∗  + λ(ζ, 0≤η≤1

This implies that      ˆ  ˆ ημ) − λ∗  . λ(ζ, μ) − λ∗  ≤ C ζ  + μC max λ(ηζ, 0≤η≤1

This condition remains satisfied if, on the left-hand side, we replace ζ by ηζ and μ by ημ, so that     ˆ  ˆ  max λ(ηζ, ημ) − λ∗  ≤ C ζ  + μC max λ(ηζ, ημ) − λ∗  . 0≤η≤1

Hence

0≤η≤1

  ˆ  max λ(ηζ, ημ) − λ∗  ≤

0≤η≤1

Combining this with (16.9) produces ) 2   2   ˆ x(ζ,  ˆ μ) − x∗ + λ(ζ, μ) − λ∗  ≤ C +

C ζ  . 1 − Cμ

 C2μ C ζ  ≤ ζ  ≤ 2C ζ  . 1 − Cμ 1 − Cμ

Let M = 2C. If we now reverse the change of variables made in step 1, we obtain M λ − λ∗  ρ M λ+ (λ, ρ) − λ∗  ≤ λ − λ∗  ρ x(λ, ρ) − x∗  ≤

¯ 1/δ }. Because x(λ, ρ) is continuously differentiable, for λ − λ∗  ≤ δρ and ρ > max { ρ, we can find a constant M that produces the same result for ρ¯ ≤ ρ ≤ max { ρ, ¯ 1/δ }. This completes the proof. This theorem can be used to prove convergence of an augmented Lagrangian method. First, notice that if λ = λ∗ , then the algorithm converges in one iteration. More generally,

i

i i

i

i

i

i

634

book 2008/10/23 page 634 i

Chapter 16. Penalty and Barrier Methods

if the algorithm is controlled so that the multiplier estimates λk remain bounded, then λk − λ∗  will also remain bounded. By choosing ρ large enough, the error bound in the theorem will guarantee that λk+1 − λ∗  ≤

M λk − λ∗  ρ

with M/ρ < 1. This shows that the multipliers converge linearly, and hence { xk } converges also. If a sequence { ρk } of barrier parameters are used, with lim ρk = +∞, then lim

k→∞

λk+1 − λ∗  M = 0, ≤ lim k→∞ ρk λk − λ∗ 

showing that the multiplier estimates { λk } converge superlinearly. The “convergence rate” here is not directly comparable to the convergence rates of the other methods we have discussed. Each iteration of the augmented Lagrangian method involves the solution of an unconstrained minimization subproblem, whereas an iteration of the other methods required at most the solution of a system of linear equations. Thus the iterations here are in general much more expensive than the iterations of the other methods. In special cases (for example, when Newton’s method is applied to a convex problem) it can be shown that, for points xk ≈ x∗ , only one Newton iteration need be applied to each subproblem. Under such circumstances, the convergence rate of an augmented Lagrangian method is comparable to that of other methods. If ρ is large, then the augmented Lagrangian method will suffer from ill-conditioning, just as the penalty method did. Thus there is a conflict between rate of convergence and conditioning of the method. This ill-conditioning can be controlled by using stabilized formulas for the search directions, analogous to the techniques described in Section 16.4. A multiplier-based method can also be derived for problems with inequality constraints: minimize f (x) subject to

g(x) ≥ 0.

In this case, if a multiplier estimate λk ≈ λ∗ and a barrier parameter μk > 0 are specified, then at the kth iteration a modified barrier function is minimized to obtain xk+1 : minimize Sμk (x, λk ) = f (x) − μk x

m

(λk )i log(μ−1 k gi (x) + 1).

i=1

Then the multipliers are updated using (λk+1 )i =

(λk )i −1 μk gi (xk+1 )

+1

.

If this update formula is used, then (as before) ∇x L(xk+1 , λk+1 ) = ∇f (xk+1 ) − ∇g(xk+1 )λk+1 = 0, so that this part of the optimality conditions is satisfied. The iteration is continued until complementary slackness is attained.

i

i i

i

i

i

i

16.6. Multiplier-Based Methods

book 2008/10/23 page 635 i

635

In the barrier method, every estimate of the solution has to be strictly feasible so that the logarithmic barrier term can be evaluated. The modified barrier function is defined as long as μ−1 gi (x) + 1 > 0, or gi (x) > −μ. Thus the modified barrier function permits the constraints to be violated by as much as μ. The modified barrier function has many of the same properties as the augmented Lagrangian function. For any μ > 0, Sμ (x∗ , λ∗ ) = f (x∗ ) and ∇x Sμ (x∗ , λ∗ ) = ∇f (x∗ ) − ∇g(x∗ )λ∗ = 0. Hence the gradient of the modified barrier function is equal to the gradient of the Lagrangian and vanishes as the solution. The Hessian matrix of the modified barrier function is positive definite under certain conditions for μ less than some critical value μ. ¯ Finally, there is an analog of our convergence theorem that shows that xk+1 − x∗  ≤ Mμ λk − λ∗ 

and

λk+1 − λ∗  ≤ Mμ λk − λ∗ 

for some constant M. (See the Exercises.)

16.6.1

Dual Interpretation

The convergence of the augmented Lagrangian method is determined by the Lagrange multiplier estimates, and in fact the entire method can be considered as an algorithm for solving the dual problem. If the constrained problem is minimize subject to

f (x) g(x) = 0,

then the iteration has the form λk+1 = λk − ρk g(xk+1 ). We can interpret −g(xk+1 ) as a search direction for the dual problem, with ρk as the step length. In this subsection we examine this interpretation in greater detail. Our discussion is based on the theory of local duality (see Section 14.8.3). The constrained optimization problem may not be convex, but it is equivalent to minimize subject to

πρ (x) = f (x) + 12 ρg(x)Tg(x) g(x) = 0.

Lemma 16.13 shows that this problem is locally strictly convex near (x∗ , λ∗ ) for ρ sufficiently large. The corresponding dual problem (in a neighborhood of (x∗ , λ∗ )) is maximize L∗ (λ), λ

i

i i

i

i

i

i

636

book 2008/10/23 page 636 i

Chapter 16. Penalty and Barrier Methods

where the dual function is defined as

L∗ (λ) = min f (x) − λTg(x) + 12 ρg(x)Tg(x) . x

We could apply any unconstrained optimization method to maximize L∗ , and in fact any such method would give an update formula for λk . Of most relevance to us will be Newton’s method and the steepest-ascent method. (The steepest-ascent method for a maximization problem is the analog of the steepest-descent method for a minimization problem.) In Section 14.8 we derived formulas for the gradient and Hessian matrix of the dual function. When applied to this case we obtain ∇L∗ (λ) = −g(x(λ)) 2 ∇ 2 L∗ (λ) = −∇g(x(λ))T[∇xx L(x(λ), λ) + ρ∇g(x(λ)∇g(x(λ))T]−1 ∇g(x(λ)), where x(λ) is the value of x obtained when evaluating L∗ (λ). The steepest-ascent method uses the search direction pk = ∇L∗ (λk ) = −g(x(λk )) and so the update formula λk+1 = λk − ρk g(xk+1 ) for the augmented Lagrangian method corresponds to applying the steepest-ascent method to the dual problem with a fixed step length ρk . As was pointed out in Chapter 12, the steepest-ascent method is often slow to converge, and so it is normally advisable to use a better method, such as Newton’s method. What we will show is that, in the limit as ρ → ∞, this update formula becomes the classical Newton method applied to the dual problem. Thus, at least for large values of ρ, using the steepest-ascent method (even with this fixed step length) can achieve rapid convergence. The convergence of the steepest-ascent method depends on the condition number of the Hessian matrix of L∗ (see Section 12.2). The following lemma determines this condition number. Note that 2 −∇g(x(λ))T[∇xx L(x(λ), λ)]−1 ∇g(x(λ)) is the Hessian matrix of the dual function for the original problem. Lemma 16.15 (Condition Number of Dual Hessian). Let L∗ (λ) be the dual function for the augmented optimization problem. Then the condition number of ∇ 2 L∗ (λ) is W −1 + ρ , w −1 + ρ where w and W are the smallest and largest eigenvalues, respectively, of 2 ∇g(x(λ))T[∇xx L(x(λ), λ)]−1 ∇g(x(λ)). 2 Proof. Let H = ∇xx L(x(λ, λ) and A = ∇g(x(λ))T. Then the Hessian matrix of the dual function is −A[H + ρATA]−1 AT.

i

i i

i

i

i

i

16.6. Multiplier-Based Methods

book 2008/10/23 page 637 i

637

We must relate the eigenvalues of this matrix to those of AH −1 AT. We do this by showing that these matrices have the same eigenvectors. The matrix version of the Sherman–Morrison formula (see Appendix A.9) can be used to show that ρA[H + ρATA]−1 AT = I − (I + ρAH −1 AT)−1 (see the Exercises). Multiplying on the right by (I + ρAH −1 AT) we obtain ρA[H + ρATA]−1 AT(I + ρAH −1 AT) = ρAH −1 AT. Let y be an eigenvector of AH −1 AT with corresponding eigenvalue v. Then ρA[H + ρATA]−1 AT(1 + ρv)y = ρvy. Hence y is also an eigenvector of A[H + ρATA]−1 AT with eigenvalue 1 ρv = −1 . ρ(1 + ρv) v +ρ Letting v be the smallest and largest eigenvalues of AH 1 AT completes the proof. To see what happens for large values of ρ, we examine W −1 + ρ = 1. ρ→∞ w −1 + ρ lim

Hence, as ρ increases, the Hessian matrix becomes better conditioned and the steepest-ascent method performs better. The search direction for Newton’s method in the dual is pk = −[∇ 2 L∗ (λk )]−1 ∇L∗ (λk ). The Hessian here is 2 L(x(λ), λ) ∇ 2 L∗ (λ) = −∇g(x(λ))T[∇xx + ρ∇g(x(λ)∇g(x(λ))T]−1 ∇g(x(λ)).

The Sherman–Morrison formula (see the proof of Lemma 16.15) implies that, for large values of ρ, ∇ 2 L∗ (λ) ≈ −ρ −1 I. Hence the Newton direction satisfies pk ≈ ρ∇L∗ (λk ) = −ρg(x(λk )) and the update formula λk+1 = λk − ρk g(xk+1 ) for the augmented Lagrangian method corresponds to an approximate Newton method when ρ is large. Unfortunately, we can expect the augmented Lagrangian function to be ill conditioned in this case. This provides an additional explanation of the conflict between

i

i i

i

i

i

i

638

book 2008/10/23 page 638 i

Chapter 16. Penalty and Barrier Methods

rapid convergence and numerical stability for this method.

Exercises 6.1. Consider the one-dimensional problem minimize

f (x) = − 12 x 2

subject to

x = 1.

Verify that the solution is x∗ = 1, λ∗ = −1. Show that if ρ < 1, then the augmented Lagrangian function Aρ (x, λ) is unbounded below. Show also that for ρ > 1 the augmented Lagrangian function is strictly convex when considered as a function of x, and thus has a unique minimizer. What happens when ρ = 1? 6.2. For the example in the previous problem, suppose that x0 = 0 and λ0 = 0. Prove that if ρ is fixed and ρ > 1, then xk = 1 −

(−1)k (ρ − 1)k

and

λk = −1 +

(−1)k . (ρ − 1)k

What is the limit point of (xk , λk )? What is the convergence rate? 6.3. Use the matrix version of the Sherman–Morrison formula (see Appendix A.9) to prove that ρA[H + ρATA]−1 AT = I − (I + ρAH −1 AT)−1 . 6.4. Use the previous problem to prove that ∇ 2 L∗ (λ) ≈ −ρ −1 I. 6.5. (From Avriel (1976, reprinted 2003).) Consider the quadratic problem minimize

f (x) = 12 x TQx + θbTx

subject to

bTx = 0,

x

where Q is a nonsingular symmetric matrix that is positive definite on the subspace bTx = 0. The vector b = 0 and the scalar θ > 0 are given. (i) What is the optimal solution to this problem? What is the corresponding Lagrange multiplier? (ii) Suppose the problem is solved by the augmented Lagrangian method, where the multiplier estimates are updated in the standard way. Let λk be the multiplier estimate at the kth iteration, and let ρ be the penalty parameter. Show that, if the augmented Lagrangian has a minimum, its minimizer is xk =

(λk − θ)Q−1 b . 1 + ρbTQ−1 b

(iii) If we initialize the method with λ1 = 0, show that   θ Q−1 b 1 xk = − and λ = −θ − 1 . k+1 (1 + ρbTQ−1 b)k (1 + ρbTQ−1 b)k

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 639 i

639

(iv) Assume that the penalty parameter ρ is held fixed throughout the solution process. For what values of ρ is the iterative process guaranteed to converge? (Assume as in part (iii) that λ0 = 0.) (v) Comment on the effect of the value of the penalty parameter ρ on (i) the rate of convergence of the algorithm, and (ii) the condition number of the Hessian matrix of the augmented Lagrangian function. 6.6. Consider an optimization problem with a single constraint: minimize

f (x)

subject to

g(x) ≥ 0.

Make the constraint an equality by subtracting a squared slack variable s. (i) What is the augmented Lagrangian function Aρ (x, s, λ) for this problem? (ii) Determine the update formula for the Lagrange multiplier. √ (iii) Let (x∗ , λ∗ ) be the solution to the original problem, and let s∗ = g(x∗ ). Prove that Aρ (x∗ , s∗ , λ∗ ) = f (x∗ ), and that ∇xs Aρ (x∗ , s∗ , λ∗ ) = 0. 6.7. Suppose that 2 ∇xx A = H + ρATA.

Write x = Zv + q, where Z is a basis matrix for the null space of A and q is in the range of AT. Let α be the smallest eigenvalue of Z TH Z and assume that α > 0. Also, let β = Z, γ = H , and let δ be the smallest nonzero eigenvalue of ATA. (i) Prove that 2 x T(∇xx A)x ≥ α v2 − 2βγ v q + (ρδ − γ ) q2 . 2 A)x > 0 if (ii) Prove that x T(∇xx

1 ρ> δ



6.8. In the proof of Theorem 16.14, prove that  2 ∇xx L(x∗ , λ∗ ) −∇g(x∗ )T

β 2γ 2 +γ α



−∇g(x∗ ) −μI

.



is invertible for 0 ≤ μ ≤ 1/ρ. ¯ 6.9. Let (x∗ , λ∗ ) be a solution to minimize subject to

f (x) g(x) ≥ 0.

Prove that, for any μ > 0, the modified barrier function satisfies Sμ (x∗ , λ∗ ) = f (x∗ )

i

i i

i

i

i

i

640

book 2008/10/23 page 640 i

Chapter 16. Penalty and Barrier Methods and ∇x Sμ (x∗ , λ∗ ) = ∇f (x∗ ) − ∇g(x∗ )λ∗ = 0.

6.10. The modified-barrier function is a barrier function with shifted constraints, that is, it perturbs the constraint g(x) ≥ 0 to g(x) ≥ −μ. Prove that the augmented Lagrangian function is equivalent to the shifted penalty function f (x) + 12 ρ(g(x) − ρ −1 λ)T(g(x) − ρ −1 λ). 6.11. Prove an analog of Theorem 16.14 for the modified-barrier function, showing that (for some constant M) xk+1 − x∗  ≤ Mμ λk − λ∗ 

and

λk+1 − λ∗  ≤ Mμ λk − λ∗  .

Assume that strict complementarity slackness holds.

16.7

Nonlinear Primal-Dual Methods

The penalty and barrier methods that we have discussed so far assign different roles to the primal and dual variables. An unconstrained optimization problem is solved to find the primal iterate xk ; then the dual iterate λk is computed from xk using a simple formula. This asymmetry between the primal and dual variables limits the efficiency of the methods. In this section we describe a family of methods that assign an equal role to both primal and dual variables. The resulting methods are in general more efficient, with a faster convergence rate and better performance. They were originally inspired by the success of primal-dual interior-point methods for linear programming (see Chapter 10). These methods share some characteristics of barrier methods. In particular, they solve a sequence of subproblems with a barrier parameter that is shrinking to zero. But, unlike in a traditional barrier method, for each value of the barrier parameter only a small number of Newton iterations are used, perhaps only one. The Newton iteration is based on a system of nonlinear equations derived from the optimality conditions for the barrier problem. The solution to this system is used to update the primal and dual iterates simultaneously. Under an appropriate condition, and if started sufficiently close to the solution, the algorithm can achieve a quadratic rate of convergence, which is a most desirable property. The overall method is called a primal-dual interior-point method. It is a “primaldual” method because the two sets of variables are given equal prominence, and it is an “interior-point” method because the iterates lie in the interior of the feasible region. Since the development of Karmarkar’s method in 1984, primal-dual interior-point methods have become a major focus of theoretical research and practical experiments. For linear programming, there are polynomial-time algorithms of this type. Computational experiments have demonstrated that primal-dual interior-point methods are very efficient for linear, convex quadratic, and general nonlinear problems. In the following subsections we derive a primal-dual interior-point method for solving general nonlinear optimization problems and present a convergence theorem.

i

i i

i

i

i

i

16.7. Nonlinear Primal-Dual Methods

16.7.1

book 2008/10/23 page 641 i

641

Primal-Dual Interior-Point Methods

We will focus on a minimization problem with inequality constraints: minimize subject to

f (x) gi (x) ≥ 0,

i = 1, . . . , m.

Equality constraints can be included in the formulation, but we ignore them to simplify the presentation. The primal-dual interior-point method will be derived from a lagarithmic barrier method minimize βμk (x), m where βμk (x) = f (x) − μk i=1 log gi (x). The minimization problem will be solved for a decreasing sequence of barrier parameters μk . The solution (x(μk ), λ(μk )) to the barrier subproblem satisfies the following perturbed primal-dual system of equations and inequalities (see Section 16.2): g(x) ≥ 0 ∇x L(x, λ) = ∇f (x) −

m

λi ∇gi (x) = 0

i=1

λ≥0 λi gi (x) = μk ,

i = 1, . . . , m,

 where L(x, λ) = f (x) − m i=1 λi gi (x) is the Lagrangian of the problem. The equations will serve as the foundation for the new method. At each iteration the primal-dual interior-point method obtains a search direction by computing the Newton directions ( xk , λk ) for the following nonlinear system of equations: ∇x L(x, λ) = ∇f (x) −

m

i=1

λi ∇gi (x) = 0 λi gi (x) = μk ,

i = 1, . . . , m.

To derive the formulas for the Newton directions, we linearize this system at (xk , λk ) using Taylor’s series, ignoring the terms of second and higher order, and set the linearized system to zero. If we write x = xk + xk and λ = λk + λk , then the Taylor series expansions are ∇x L(x, λ) = ∇x L(xk + xk , λk + λk ) 2 2 ≈ ∇x L(xk , λk ) + ∇xx L(xk , λk ) xk + ∇λx L(xk , λk ) λk 2 = ∇x L(xk , λk ) + ∇xx L(xk , λk ) xk − ∇g(xk ) λk

and λi gi (x) = ((λk )i + ( λk )i )gi (xk + xk ) ≈ (λk )i gi (xk ) + λi ∇gi (xk )T xk + ( λk )i gi (xk ),

i = 1, . . . , m,

i

i i

i

i

i

i

642

book 2008/10/23 page 642 i

Chapter 16. Penalty and Barrier Methods

 2 2 L(x, λ) = ∇ 2 f (x)− m where ∇xx i=1 λi ∇ gi (x) is the Hessian of the Lagrangian and ∇g(x) is the transpose of the Jacobian of the vector-valued function g(x) = (g1 (x), . . . , gm (x))T . If we ignore the second- and higher-order terms, we obtain the following linear system for the primal and dual directions:  2     ∇xx L(xk , λk ) −∇g(xk ) −∇x L(xk , λk ) xk = , k ∇g(xk )T G(xk ) λk −k g(xk ) + μk e where G(x) is the diagonal matrix with elements gi (x), i = 1, . . . , m;  is the diagonal matrix with the elements λi , i = 1, . . . , m; and e = (1, . . . , 1)T . The primal-dual interior-point method requires that the inequalities of the perturbed system be strictly satisfied. This means that the iterates xk are strictly feasible (gi (xk ) > 0) and that (λk )i > 0, i = 1, . . . , m. If the initial values (x0 , λ0 ) are interior to the feasible region, then the choice of the step lengths αP and αD will guarantee that the subsequent iterates are also interior to the feasible region. If the feasible set does not have an interior point, then the method cannot be used. The following ratio test can be used to keep the dual iterates λk+1 positive: . (λk )i αD = min 1; −κ ( λ : ( λ ) < 0 , k i ) k i 1≤i≤m

where 0 < κ < 1. To keep the primal iterates in the interior of the primal feasible, set the algorithm uses a backtracking line search. As the step length is reduced, the trial point gets closer to xk , which satisfies gi (xk ) > 0. If the constraint functions gi (x) are continuous, then for a small-enough step length we are guaranteed that the trial point must satisfy gi (xk+1 ) > 0 also. The optimality test is based on a merit function that measures the violation of optimality conditions ν(x, λ) = max{∇x L(x, λ), G(x)λ}. At the solution, ν(x∗ , λ∗ ) = 0. (For additional discussion of merit functions, see Section 14.6.) We are now able to present our algorithm. Algorithm 16.1. Primal-Dual Interior-Point Algorithm 1. Choose (x0 , λ0 ) such that gi (x0 ) > 0 and (λ0 )i > 0 for i = 1, . . . , m, and select an initial barrier parameter μ0 > 0. 2. For k = 0, 1, . . . do the following: (i) The Optimality Test—If ν(xk , λk ) = 0, then stop. (ii) Find the Primal-Dual Directions—Compute ( xk , λk ) by solving the linear system of equations  2     ∇xx L(xk , λk ) −∇g(xk ) −∇x L(xk , λk ) xk = . k ∇g(xk )T −k g(xk ) + μk e G(xk ) λk

i

i i

i

i

i

i

16.7. Nonlinear Primal-Dual Methods

book 2008/10/23 page 643 i

643

(iii) Find the Primal and the Dual Step Lengths—Compute αD from the formula . (λk )i αD = min 1; −κ ( λ : ( λ ) < 0 . k i k )i 1≤i≤m

Compute αP using a backtracking line search: choose αP as the first element of the sequence { 1, 1/2, 1/4, . . . } for which gi (xk +αP xk ) > 0 for i = 1, . . . , m. The choices of the step lengths αP and αD guarantee that xk+1 is in the interior of the primal feasible regions and λk+1 is positive. (iv) The Update—Determine xk+1 and λk+1 from xk+1 = xk + αP xk λk+1 = λk + αD λk . (v) The Barrier Parameter Update—Compute μk+1 using an appropriate rule, e.g., μk+1 = θμk ,

0 < θ < 1.

Example 16.16 (Primal-Dual Interior-Point Method). We apply the primal-dual interiorpoint method to the problem from Example 16.1: minimize subject to

f (x) = x1 − 2x2 g1 (x) = 1 + x1 − x22 ≥ 0 g2 (x) = x2 ≥ 0.

The initial guess is chosen in the interior of the primal and dual feasible sets: x0 = (0.5, 0.5)T and λ0 = (0.5, 0.5)T. The initial barrier parameter is μ0 = 1. For these values, the merit function ν(x0 , λ0 ) is nonzero, so the optimality condition is not satisfied. The system for finding the Newton directions is ⎤ ⎡ ⎤ ⎡ −1 + λ1 0 0 −1 0   ⎢ ⎥ ⎢ 0 2x2 −1 ⎥ 2 − 2x2 λ1 + λ2 2λ1 ⎥ x = ⎢ ⎥. ⎢ 2 ⎦ ⎣ ⎣ λ1 −2x2 λ1 1 + x1 − x22 λ 0 −λ1 (1 + x1 − x2 ) + μ ⎦ 0 λ2 −λ2 x2 + μ 0 x2 At the initial point the system is ⎡ 0 0 −1.00 ⎢ 0 1.00 1.00 ⎢ ⎣ 0.50 −0.50 1.25 0 0.50 0

⎤ ⎡ 0  0.500  ⎢ −2.000 −1.00 ⎥ x ⎥ =⎢ ⎣ −0.375 0 ⎦ λ 0.50 −0.750

⎤ ⎥ ⎥. ⎦

We solve the system to obtain x = (1.0, 1.5)T and λ = (0.5, 0)T. The primal step length αP is calculated by backtracking: αP = 1 fails to keep the next iterate x0 + αP x in the interior of the primal feasible region; however, αP = 0.5 produces an acceptable primal iterate x1 = x0 + 0.5 x = (1.00, 1.25)T. The dual step length αD = 1 is calculated using the ratio test with κ = 0.9, giving λ1 = λ0 + λ = (1.0, 0.5)T.

i

i i

i

i

i

i

644

book 2008/10/23 page 644 i

Chapter 16. Penalty and Barrier Methods

Table 16.3. Interior-point method.

k

μ

αP

xk

αD

λk

1 2 3 4 5 6 7

1 10−1 10−2 10−3 10−4 10−5 10−6

0.5 1 1 1 1 1 1

(1.00000, 1.25000)T (0.22500, 1.07500)T (0.02424, 1.00924)T (0.00207, 1.00057)T (0.00020, 1.00005)T (0.00002, 1.00000)T (0.00000, 1.00000)T

1 1 1 0.96 0.95 0.95 0.95

(1.00000, 0.50000)T (1.00000, 0.15000)T (1.00000, 0.01847)T (1.00000, 0.00185)T (1.00000, 0.00018)T (1.00000, 0.00001)T (1.00000, 0.00000)T

If we update the barrier parameter using μk+1 = 0.1μk , then μ1 = 0.1. At the next iteration, the optimality test gives ν(x1 , λ1 ) = 0, so the algorithm executes the second step. The results of the next few iterations are listed in Table 16.3. The table shows the barrier parameter, the primal-dual iterates xk and λk , and their step lengths αP and αD . In this example, the algorithm converges linearly to the primal-dual solution x∗ = (0, 1)T and λ∗ = (1, 0)T . Primal-dual interior-point methods are well defined if the matrix  2  ∇xx L(x, λ) −∇g(x) M(x, λ) = ∇g(x)T G(x) from the system for finding the search directions is nonsingular. The second-order optimality, strict complementarity, and regularity conditions guarantee the nonsingularity of M(x, λ) in some neighborhood of the primal-dual solution. Further from the solution, the 2 algorithm may regularize the Hessian ∇xx L(x, y), if necessary, to guarantee that the matrix M(x, λ) is nonsingular: 2 Rt (x, y) = ∇xx L(x, y) + tI,

t ≥ 0,

where I is the identity matrix and t ≥ 0 is the regularization parameter. It can be shown that if t ≥ 0 is large enough, then replacing the Hessian with the regularized Hessian guarantees that the matrix M is nonsingular (see the Exercises). The efficiency of the algorithm depends critically on the strategy for updating the barrier parameter μ at each iteration. This strategy affects the rate of convergence of the interior-point method and therefore the number of steps required to find the solution to a specified accuracy. We will discuss the rate of convergence in Section 16.7.2. Another factor that affects the performance of the primal-dual interior-point algorithm is the efficiency of solving the Newton system for the search directions at each step. An effective implementation must exploit any sparsity or other structure in the matrix. The system can be modified by a simple division of its rows such that the system matrix becomes symmetric (see the Exercises). Also by eliminating λ, the system can be

i

i i

i

i

i

i

16.7. Nonlinear Primal-Dual Methods

book 2008/10/23 page 645 i

645

reduced so the system matrix becomes symmetric and positive definite (see the Exercises). Therefore a direct method using an LDLT or Cholesky factorization can be an efficient technique, especially if the matrix is sparse. In the next subsection we discuss convergence of the primal-dual interior-point method.

16.7.2

Convergence of the Primal-Dual Interior-Point Method

In primal-dual interior-point methods, the primal and dual variables play equally important roles in convergence. This symmetry enables interior-point methods to have a better convergence rate than either barrier or penalty methods. In this section, we present an interior-point method that has a quadratic convergence rate in the neighborhood of the solution. The interior-point method is applied to an equivalent problem that includes slack variables. This leads to a somewhat more complicated presentation, but the resulting algorithm has better theoretical and practical properties. The original problem can be reformulated using slack variables si , i = 1, . . . , m: minimize subject to

f (x) gi (x) − si = 0,

si ≥ 0,

i = 1, . . . , m.

Although this problem has more variables and constraints, the inequality constraints now have a simple form: si ≥ 0, i = 1, . . . , m. Starting from an initial guess z0 = (x 0 , s 0 , λ0 ), a primal-dual interior-point method for this problem generates a sequence of primal-dual iterates zk = (xk , sk , λk ), k = 1, 2, 3, . . . . If the iterate zk = (x k , s k , λk ) of the algorithm is close to the solution z∗ = (x∗ , s∗ , λ∗ ), i.e., zk is in the neighborhood Uε (x∗ , s∗ , λ∗ ) = {(x, s, λ) : x − x∗  ≤ ε, s − s∗  ≤ ε, λ − λ∗  ≤ ε, m x ∈ n , s ∈ m + , λ ∈ + }, for some ε > 0, then the primal-dual interior-point method converges to the solution with a quadratic rate, under the conditions of the theorem below. This version of the interior-point method does not guarantee that the equality constraints gi (x) − si = 0, i = 1, . . . , m, are satisfied until the problem is solved, and therefore does not require all the functions gi (x), i = 1, . . . , m, to be positive at an initial guess. In fact, the algorithm we describe can choose an arbitrary initial guess x0 . What matters is that the slacks (s0 )i and the dual variables (λ0 )i are positive and remain so until the algorithm finds a solution. The following ratio tests are used to keep sk and λk positive: . (sk )i αP = min 1; −κ ( s : ( s ) < 0 k i k )i 1≤i≤m

αD = min

1≤i≤m

. (λk )i : ( λ ) < 0 , 1; −κ ( λ k i k )i

-

where 0 < κ < 1.

i

i i

i

i

i

i

646

book 2008/10/23 page 646 i

Chapter 16. Penalty and Barrier Methods The first-order optimality conditions for the problem with slacks have the following

form:

∇f (x∗ ) − ∇g(x∗ )T λ∗ S∗ ∗ e g(x∗ ) − s∗ s∗ λ∗

= = = ≥ ≥

0 0 0 0 0,

where S is the diagonal matrix with the elements si , i = 1, . . . , m (see the Exercises). Since the algorithm keeps (sk )i and (λk )i positive, the merit function ν(x, s, λ) = max {∇f (x) − ∇g(x)λ, Se, g(x) − s} measures the violation of the optimality conditions. The rate of convergence of the primal-dual interior-point method depends on the rule used to update the barrier parameter. If we use μk = θμk−1 or μk = θ ν(xk , sk , λk ) for some 0 < θ < 1, the interior-point algorithm converges only at a linear rate. However, the following rule for changing the barrier parameter,

μk = min θν(xk , sk , λk ), ν(xk , sk , λk )2 , makes it possible to achieve a quadratic rate of convergence in a neighborhood Uε (x∗ , s∗ , λ∗ ) of the solution. To achieve this fast convergence we must also vary the parameter κ in the ratio tests: κ = max {κ, ¯ 1 − ν(xk , sk , λk )} , where 0 < κ¯ < 1. The following theorem describes the local convergence properties of this primal-dual interior-point method. Theorem 16.17. Assume that the second-order sufficiency, regularity, and strict complementarity conditions are satisfied for the problem with inequality constraints, and that the Hessians ∇ 2 f (x) and ∇ 2 gi (x), i = 1, . . . , m, are Lipschitz continuous with constant L > 0: ∇ 2 f (x) − ∇ 2 f (y) ≤ Lx − y ∇ 2 gi (x) − ∇ 2 gi (y) ≤ Lx − y,

i = 1, . . . , m,

in some neighborhood z∗ = (x ∗ , s ∗ , λ∗ ) of the solution, i.e., (x, s, λ) ∈ Uε0 (x ∗ , s ∗ , λ∗ ) for some ε0 > 0. Also assume that the primal-dual interior-point method updates the barrier and step length parameters using the formulas

μk = min θ ν(xk , sk , λk ), ν(xk , sk , λk )2 , 0 < θ < 1

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 647 i

647

and κ = max {κ, ¯ 1 − ν(xk , sk , λk )} ,

0 < κ¯ < 1.

Then there exists 0 < ε ≤ ε0 such that for any zk = (xk , sk , λk ) ∈ Uε (z∗ ), the new approximation zk+1 = (xk+1 , sk+1 , λk+1 ) satisfies zk+1 − z∗  ≤ czk − z∗ 2 , where the constant 0 < c < ∞ depends only on the data in the optimization model. The convergence theorem can be used to estimate the number of steps required to solve the problem to a given accuracy if a primal-dual iterate zk is in the neighborhood Uε0 (z∗ ) of the solution. However, outside this neighborhood, further modifications are needed to guarantee convergence of the algorithm. (See, for example, Section 14.6.)

Exercises 7.1. Consider the problem19 minimize subject to

f (x) = x 2 + 1 g(x) = x − 2 ≥ 0.

(i) Find the primal-dual solution (x∗ , λ∗ ) to this problem. (ii) Write the perturbed primal-dual system corresponding to the interior-point method. (iii) Find the solution (x(μ), λ(μ)). (iv) Verify that limμ→0 x(μ) = x∗ and limμ→0 λ(μ) = λ∗ . (v) Derive the matrix   2 ∇xx L(x, λ) −∇g(x) . M(x, λ) = ∇g(x)T G(x) (vi) Prove that the inverse of the matrix M(x, λ) exists for any x and λ in the interior of the primal and dual feasible sets. (vii) Starting with x0 = 2, λ0 = 12 , and μ0 = 0.1, perform two iterations of the primal-dual interior-point method with the rule μk+1 = 0.1μk for updating the barrier parameter. Show that (x1 , λ1 ) is closer to (x∗ , λ∗ ) than (x0 , λ0 ) is, and that (x2 , λ2 ), in turn, is closer to (x∗ , λ∗ ) than (x1 , λ1 ) is. Use κ = 0.9 for the ratio test. 7.2. Consider the problem minimize subject to

f (x) = 13 x 3 x≥1 x ≤ 3.

19 The earlier exercises are based on the ideas of subsection 16.7.1. Starting with Exercise 7.8, the exercises are based on the ideas of subsection 16.7.2.

i

i i

i

i

i

i

648

book 2008/10/23 page 648 i

Chapter 16. Penalty and Barrier Methods (i) What is the solution (x∗ , λ∗ ) to this problem? (ii) Starting with x0 = 1, λ0 = (1, 1)T , and μ0 = 0.1, perform two iterations of the primal-dual interior-point method with the rule μk+1 = 0.1μk for updating the barrier parameter. Use κ = 0.9 for the ratio test. Show that (x1 , λ1 ) is closer to (x∗ , λ∗ ) than (x0 , λ0 ) is, and that (x2 , λ2 ), in turn, is closer to (x∗ , λ∗ ) than (x1 , λ1 ) is.

7.3. Consider the problem minimize

f (x) = x1 + x2

subject to

x12 + x22 ≤ 2.

(i) What is the solution (x∗ , λ∗ ) to this problem? (ii) Starting with x0 = (1, 0)T , λ0 = 1, and μ0 = 0.1, perform two iterations of the primal-dual interior-point method with the rule μk+1 = 0.1μk for updating the barrier parameter. Use κ = 0.9 for the ratio test. Show that (x1 , λ1 ) is closer to (x∗ , λ∗ ) than (x0 , λ0 ) is, and that (x2 , λ2 ), in turn, is closer to (x∗ , λ∗ ) than (x1 , λ1 ) is. 7.4. Prove that if the second-order sufficiency, regularity, and strict complementarity conditions are satisfied at the solution, then the matrix M(x∗ , λ∗ ) is nonsingular. 7.5. Consider a problem with inequality constraints. Assuming that the feasible set is bounded, prove that for any μ > 0 there exists a solution to the barrier subproblem (x(μ), λ(μ)). 7.6. Prove that for any primal and dual vectors x and λ in the interior of the primal and dual feasible sets, if the regularized Hessian 2 L(x, y) + tI, Rt (x, y) = ∇xx

t ≥ 0,

2 L(x, λ), then the matrix where I is the identity matrix, is used instead of ∇xx   Rt (x, λ) −∇g(x) Mt (x, λ) = ∇g(x)T G(x)

7.7.

7.8. 7.9. 7.10. 7.11.

is nonsingular for sufficiently large t ≥ 0. In the primal-dual interior-point methods, the matrix of the system for the search directions is not symmetric. Derive an equivalent symmetric system of equations of the same size. Derive an equivalent symmetric positive semidefinite system of equations of reduced size n, where n is a number of variables. Derive the first-order optimality conditions for the problem formulation with slacks. Derive the perturbed system for the problem formulation with slacks. For the interior-point method that uses slacks, derive the linear system for finding the Newton directions. What is the coefficient matrix M(x, s, λ)? Consider the problem minimize f (x) = 12 x 2 + 1 subject to x ≥ 1. (i) Reformulate the problem using a slack variable s.

i

i i

i

i

i

i

16.8. Semidefinite Programming (ii) (iii) (iv) (v) (vi) (vii)

book 2008/10/23 page 649 i

649

Verify that the solution is x∗ = 1, s∗ = 0, λ∗ = 1. Write the primal-dual system corresponding to the interior-point method. Find the solution (x(μ), s(μ), λ(μ)). Verify that limμ→0 x(μ) = x∗ , limμ→0 s(μ) = s∗ , and limμ→0 λ(μ) = λ∗ . Derive the matrix M(x, s, λ). Prove that the solution of the primal-dual system for finding the search directions exists if and only if s + λ > 0.

7.12. Derive the second-order sufficiency conditions for the formulation with slack variables. 7.13. Prove that the second-order sufficiency conditions for the formulation with slack variables are equivalent to the second-order sufficiency conditions for the original formulation. 7.14. Prove that the regularity conditions for the formulation with slack variables are equivalent to the regularity conditions for the original formulation. 7.15. Prove that if the second-order sufficiency, regularity, and strict complementarity conditions are satisfied at the solution, then the matrix M(x∗ , s∗ , λ∗ ) is nonsingular. 7.16. Prove that for any primal-dual vector z = (x, s, λ) such that s > 0, λ > 0 and for large enough t ≥ 0, the regularized matrix ⎡ ⎤ Rt (x, λ) 0 −∇g(x) ⎦ 0  S Mt (z) = ⎣ ∇g(x)T −I 0 is nonsingular. (Rt (x, λ) is the regularized Hessian. See Exercise 7.6.)

16.8

Semidefinite Programming

In this section we consider another area of optimization: semidefinite programming (SDP), or the optimization of a linear function on a cone of symmetric positive semidefinite matrices. This problem is a special case of convex cone programming, for which important complexity results are established. Convex cone programming is the area of optimization that studies problems of finding a minimum of a convex, real-valued function defined on a convex cone. Convex cone problems include linear programming problems as a special case and can be solved in polynomial time using interior-point or ellipsoid methods. A general cone can be defined on a linear space of vectors or matrices. The formal definitions of a linear space and a general convex cone can be found in elementary books on linear algebra. We do not define a linear space here since the main goal of this section is to present a particular case of convex cone programming, that is, SDP, which is important for a number of reasons. First, many known classes of problems, such as linear programs and convex quadratic problems with quadratic constraints, can be formulated as SDP problems, and hence consequently as convex cone problems. Therefore all these classes of problems can be solved in polynomial time.

i

i i

i

i

i

i

650

book 2008/10/23 page 650 i

Chapter 16. Penalty and Barrier Methods

Second, SDP problems can address a wide range of applications including circuit design, sensor network localization, structural design, antennae design, quantum chemistry, control theory, and matrix completion problems, in addition to the applications of linear and convex quadratic programming. Third, solutions to many problems of integer optimization and nonconvex quadratic programming with many local minima can be approximated by solving semidefinite problems. Therefore many applications of integer and nonconvex quadratic programming can be addressed using SDP. These applications include, e.g., design of very large integrated circuits, where one needs to minimize cross-layer connections in a circuit design subject to layout constraints; as well as selecting traveling routes subject to logistics constraints. Fourth, since for the matrix X to be semidefinite it is necessary and sufficient that all the eigenvalues of X be nonnegative, SDP is closely related to eigenvalue optimization problems. The latter can address some hard problems in graph partitioning and stability theory. Fifth, some algorithms for linear programming, e.g., interior-point methods, can be naturally extended to SDP. SDP problems, in principle, can be formulated as nonlinear optimization problems and solved directly using nonlinear solvers. However, the specific structure of SDP problems allows putting them in a separate class closely related to linear programming. Some results form the duality theory developed for linear programming can be extended in a similar way to SDP. Finally, SDP problems can be solved efficiently in practice. There are many efficient software packages based on various methods. We mention some reports on SDP software in the Notes. We consider a general SDP problem in the primal standard form together with its dual companion. The SDP problem is an optimization problem, where the “variable” is a positive semidefinite matrix X of size n × n: minimize subject to

C•X Ai • X = bi , X " 0.

i = 1, . . . , m

Here C and Ai are symmetric matrices of size n × n, bi are numbers, and X • Y denotes the trace of the matrix Z = XY . The trace of an n × n matrix Z = (Zij ) is the sum of its diagonal elements: tr(Z) = nk=1 zkk . The notation X " 0 means that X is positive semidefinite (see Appendix A.7.1). This constraint is analogous to the nonnegativity of a vector x ≥ 0 in linear programming. The dual problem is derived using principles similar to those for linear programming: maximize subject to

bT y m  yi A i + S = C i=1

S " 0. This dual SDP problem sometimes is written in a slightly different equivalent form: maximize

bT y

subject to

C−

m 

yi Ai " 0.

i=1

i

i i

i

i

i

i

16.8. Semidefinite Programming

book 2008/10/23 page 651 i

651

The constraint C−

m

yi Ai " 0

i=1

is often called a linear matrix inequality. For simplicity, we assume that the matrices Ai , i = 1, . . . , m, are linearly independent. If they are not, we can always express dependent matrices using linearly independent matrices, and therefore can eliminate dependent matrices altogether. SDP has a wide range of applications. Most of them require an introduction of many additional concepts, which are beyond the scope of this book. Here, we mention just a few of them. The first example is minimizing the maximum eigenvalue of a matrix. This problem is useful, e.g., for stabilizing a system of differential equations. Suppose that we have a symmetric matrix A(z) that depends linearly on a vector z: A(z) = A0 + z1 A1 + · · · + zm Am . We would like to minimize the maximum eigenvalue of A(z), minimize

λmax (A(z)),

z

which is equivalent to minimize

t

subject to

λmax (A(z)) ≤ t.

It can be shown that λmax (A(z)) ≤ t is equivalent to λmax (A(z) − tI ) ≤ 0, which, in turn, is equivalent to λmin (tI − A(z)) ≥ 0. Therefore, we have the following semidefinite problem: maximize subject to

−t tI − A0 − z1 A1 − · · · − zm Am " 0.

This problem is in the form of the dual semidefinite problem described above. A related problem that can be solved using SDP is the minimization of the k largest eigenvalues of a matrix A(z). This problem can be formulated as an SDP problem: minimize subject to

kt + I • X tI + X − A0 − z1 A1 − · · · − zm Am " 0 X " 0.

This SDP problem can be reformulated in the form of the dual SDP (see the Exercises). Our next example shows that a so-called semidefinite relaxation can be used to solve integer programming problems. One way to approach an integer programming problem is to first solve an easier relaxation of the problem, and then to systematically add new constraints that refine the solution so it satisfies the constraints of the original problem. The new constraints, called cutting planes, cut off fractional solutions and “strengthen” the relaxation. For example, consider the following integer programming problem: maximize subject to

bT x Ax ≤ c xi ∈ { 0, 1 } ,

i = 1, . . . , n.

i

i i

i

i

i

i

652

book 2008/10/23 page 652 i

Chapter 16. Penalty and Barrier Methods

One way to define a relaxation to this problem is to replace the integrality constraints xi ∈ { 0, 1 }, i = 1, . . . , n, with the relaxations 0 ≤ xi ≤ 1, i = 1, . . . , n. The resulting linear programming problem can be solved efficiently, but the solution to the relaxed problem can have many noninteger components that are strictly between 0 and 1. Therefore, we may need many additional cutting planes to find an integer solution. In cases where the solution to the relaxation is not close to the solution of the original problem, we say that the relaxation is not strong enough. While using a linear programming relaxation can be successful for some combinatorial problems, in general such relaxations are poor approximations to integer problems. Therefore we need other approaches that produce stronger relaxations. At the same time we still need to be able to solve the relaxed problems efficiently. Applying SDP for constructing new types of relaxations has turned out to be successful. For example, the problem of finding a maximum cut on a graph is a difficult integer problem. The solution to this problem is used for designing electric circuits. The relaxation of the max-cut problem provides an upper bound for the solution to the max-cut problem. The difference between the solution to the relaxation and that of the original max-cut problem measures the strength of the relaxation. It is possible to construct an SDP relaxation that has an optimal value at most 14% greater than that of the max-cut problem, while for some graphs the linear programming relaxation can produce an upper bound almost 100% greater, i.e., almost twice as large as the optimal value of the max-cut problem. Therefore, using SDP relaxations, it is possible to construct new approximation algorithms with good performance for difficult integer problems. The details of these algorithms go beyond the scope of this book; however, we consider one method of how semidefinite relaxation can be introduced based on our example. Let us first define the following matrix:     x xx T x T Y = (x 1) = . 1 xT 1 This matrix is semidefinite (see the Exercises). We will add the additional constraints Yii = Yi,n+1 = Yn+1,i , which are equivalent to xi2 = xi . It is easy to see that xi2 = xi if and only if xi ∈ { 0, 1 }, i = 1, . . . , n. The relaxation of the integral constraints xi ∈ {0, 1}, i = 1, . . . , n, is obtained by replacing the matrix Y with   X x Z= , xT 1 where the matrix X is symmetric and x = diag (X), i.e., xi = Xii . The latter condition is equivalent to Zii = Zi,n+1 = Zn+1,i , i = 1, . . . , n. The class of matrices Z is wider than that of Y . We need to impose an additional constraint   X x Z= "0 xT 1 since, unlike Y , the matrix Z is not guaranteed to be semidefinite. The linear constraints Ax ≤ c can be reformulated as diag (c − Ax) " 0.

i

i i

i

i

i

i

16.8. Semidefinite Programming

book 2008/10/23 page 653 i

653

Therefore, we have the following problem: maximize subject to

bT x ⎛ diag (c − Ax) ⎝ 0 0

0 X xT

⎞ 0 x ⎠ " 0, 1

x = diag (X),

where the variables are the vector x and the matrix X. This problem can be reformulated in the form of the dual semidefinite problem described above (see the Exercises). Next, we show how SDP can be used in linear control systems. Suppose that a trajectory x(t) satisfies the following system of differential equations: x(t) ˙ = Ax(t),

x(0) = x0 ,

where A is an n × n matrix. We want to know whether x(t) remains bounded. Results from control theory state that x(t) remains bounded if and only if there exists some positive-definite matrix P $ 0 such that a Lyapunov function V (t) = x(t)T P x(t) remains uniformly bounded; i.e., the inequality V (t) ≤ M holds for all t ≥ 0 and some M > 0. To guarantee the uniform boundedness of V (t) it is enough to prove that V (t) is nonincreasing for t ≥ 0, which holds if and only if d V (t) dt

= x˙ T P x + x T P x˙ = x T AT P x + x T P Ax = x T (AT P + P A)x ≤ 0

for all t ≥ 0. Therefore if the matrix −AT P − P A is positive semidefinite for some P $ 0, then x(t) is bounded. How can we find such a positive-definite matrix P and not just positive semidefinite? For any positive-definite matrix P and any α > 0, the matrix αP is also positive definite. Therefore, we can use the condition P "I

⇐⇒

P −I "0

to determine P ; here I is the identity matrix. If we seek a matrix with a minimum condition number cond(P ), then we obtain the following SDP problem to find matrix P : minimize subject to

c −AT P − P A " 0 I % P % cI,

which can be reformulated in the form of the dual SDP problem. There are many other applications of SDP. For further information, see the Notes. Semidefinite and linear programming problems have many common features. Here, we briefly formulate some duality theorems for SDP similar to those proven for linear programming.

i

i i

i

i

i

i

654

book 2008/10/23 page 654 i

Chapter 16. Penalty and Barrier Methods

Theorem 16.18 (Weak Duality). If X is primal feasible and (y, S) is dual feasible, then there is a nonnegative duality gap: C • X − bT y = X • S ≥ 0. Proof. See the Exercises.

Theorem 16.19 (Complementarity). If X and S are positive semidefinite matrices, then X • S = 0 implies XS = 0. Proof. See the Exercises. To guarantee the existence of optimal solutions of primal and dual problems with zero duality gap, it is enough to assume the existence of positive-definite matrices X¯ $ 0 and S¯ $ 0, which satisfy the linear constraints. Theorem 16.20 (Strong Duality). If X¯ $ 0 and S¯ $ 0 are primal and dual feasible positivedefinite matrices, then there exist optimal primal and dual solutions X∗ and (y ∗ , S ∗ ), and there is no duality gap: C • X ∗ − bT y ∗ = X∗ • S ∗ = 0. Proof. See the Notes. The conditions of the strong duality theorem for SDP are stricter than similar conditions for linear programming. In linear programming we need only assume that feasible primal and dual points exist to guarantee that primal and dual optimal solutions exist. A detailed discussion of the theory and algorithms of SDP is beyond the scope of this book. We mention only that interior-point methods can be generalized to solve SDP problems. It is possible to obtain polynomial complexity results using interior-point algorithms and the theory of self-concordance. See the Notes for details.

Exercises 8.1. Reformulate the following problem bT x ⎛ ⎞ diag (c − Ax) 0 0 0 X x ⎠ " 0, x = diag (X), subject to ⎝ 0 xT 1 where the vector x and the symmetric matrix X are variables, in the form of a dual SDP problem: maximize bT y m  yi Ai " 0. subject to C − maximize

i=1

i

i i

i

i

i

i

Exercises

book 2008/10/23 page 655 i

655

8.2. Prove that the 2 × 2 matrix

 A=

a b

b c



is positive semidefinite if and only if the following three inequalities are satisfied: a ≥ 0,

c ≥ 0,

b2 ≤ ac.

8.3. Using the fact that any symmetric matrix A can be represented as A = V V T , where  is a diagonal matrix with the eigenvalues on the diagonal and V is an orthogonal matrix (see Appendix A.2), prove that a matrix A is positive semidefinite if and only if there exists a matrix B such that A = B T B. 8.4. Prove that a convex quadratic optimization problem with quadratic constraints minimize subject to

f (x) = x T Q0 x + p0T x + r0 x T Q1 x + p1T x + r1 ≤ 0 .. . T x + rm ≤ 0 x T Qm x + p m

with positive semidefinite matrices Qi , i = 0, 1, . . . m, can be formulated as an SDP problem. (Hint: Use the fact that any positive semidefinite matrix A can be represented as A = B T B.) 8.5. Consider the following problem: minimize

z = cT x

subject to

Ax = b Di x + ei 2 ≤ fiT x + gi ,

x

i = 1, . . . , m.

Here x, c, and fi are vectors of length n; b is a vector of length r; ei are vectors of length ni ; A is an r × n matrix; Di are ni × n matrices; and gi are numbers. This problem is called a second-order cone programming problem, because the feasible set is a rotated second-order Lorenz cone (see Figure 16.4). (i) Prove that the second-order cone programming problem is convex. (ii) Prove that the second-order cone programming problem can be reformulated as an SDP problem. 8.6. Prove that A • B = B • A. 8.7. Using the fact that any symmetric matrix A can be represented as A = V V T , where  is a diagonal matrix with the eigenvalues on the diagonal and V is an orthogonal matrix (see Appendix A.2), prove that any positive semidefinite matrix A can be represented as A = RR with a positive semidefinite matrix R. 8.8. Show that the problem minimize subject to

kt + I • X tI + X − A0 − z1 A1 − · · · − zm Am " 0 X"0

i

i i

i

i

i

i

656

book 2008/10/23 page 656 i

Chapter 16. Penalty and Barrier Methods

x3

x2 x1 Figure 16.4. Second-order cone. can be represented as the standard semidefinite problem in the dual form maximize

bT y

subject to

C−

m 

yi Ai " 0.

i=1

8.9. Prove that minimization of the k largest eigenvalues of a matrix A0 + z1 A1 + · · · + zm Am can be formulated as minimize subject to

kt + I • X tI + X − A0 − z1 A1 − · · · − zm Am " 0 X " 0.

8.10. Prove that if X is primal feasible and (y, S) is dual feasible, then there is a nonnegative duality gap C • X − bT y = X • S ≥ 0. 8.11. Prove that if X " 0, S " 0, and X • S = 0, then XS = 0. Is the converse true?

16.9

Notes

Penalty and Barrier Methods—The most important reference on penalty and barrier methods is the book by Fiacco and McCormick (1968, reprinted 1990). It includes an extensive survey on the methods. A more recent discussion can be found in the paper by Wright (1992). The quadratic penalty function was first described by Courant (1943). Frisch (1955) is often cited as the originator of the logarithmic barrier method; even though the formulas he uses in solving linear programming problems are related to the gradient of the barrier function,

i

i i

i

i

i

i

16.9. Notes

book 2008/10/23 page 657 i

657

Frisch does not mention the barrier function, nor does he use a barrier method. The history of these methods is more complex, and it is discussed in the paper by Fiacco (1967). Ill-Conditioning—A detailed discussion of the ill-conditioning of penalty and barrier methods can be found in the paper by Murray (1971). Stabilized Methods—The results in Section 16.4 are adapted from the paper by Nash and Sofer (1993). A related result can be found in the paper by Murray (1971). A different approach to controlling ill-conditioning is described in the paper by Wright (1994). In the large-scale case it is often advantageous to use a truncated-Newton method. In this case, a linear conjugate gradient (or some other iterative method) is used to solve the systems of equations associated with (Z TH Z)−1 . Consequently, these formulas require two runs of the conjugate-gradient method. A related set of formulas can be derived that requires only one use of the conjugate-gradient method and that is more suitable in this case; see the paper by Nash and Sofer (1993). Exact Penalty Methods—A nondifferentiable exact penalty function was first suggested by Ablow and Brigham (1955). A more general discussion can be found in the paper by Pietrzykowski (1969). Special algorithms designed to cope with the nondifferentiability are described in the papers by Zangwill (1967), Conn (1973), Lemaréchal (1975), Coleman (1979), and Mayne and Maratos (1979), for example. Augmented Lagrangian Methods—Augmented Lagrangian methods were suggested independently by Hestenes (1969) and Powell (1969). A general discussion can be found in the book by Bertsekas (1982, reprinted 1996); many ideas in the section are adapted from this book. Computational issues associated with these methods are discussed in the book by Conn, Gould, and Toint (1992). Modified-barrier methods were developed by Polyak (1992). Interior-Point Methods—The book by Fiacco and McCormick (1968, reprinted 1990) is a “classical” reference to interior-point methods for nonlinear programming. The book by den Hertog (1994) provides a comprehensive introduction to modern interior-point methods. A discussion of computational issues for interior-point methods can be found in the papers by Lustig, Marsten, and Shanno (1992) and (1994a). The proof of a quadratic rate of convergence in the neighborhood of the solution can be found in the papers of Yamashita and Yabe (1996, 2005). Practical interior-point algorithms for nonlinear programming are described in the papers of Vanderbei and Shanno (1999); Byrd, Hribar, and Nocedal (1999); and Wächter and Biegler (2006). Semidefinite Programming (SDP)—Although SDP is a relatively new topic, the idea of constraining a matrix to be positive semidefinite is an old one. In the 1880s Lyapunov used a matrix inequality constraint to characterize stability of the solution of a system of differential equations. In the 1960s Bellman and Fan introduced primal and dual SDP problems and developed duality theorems. In the 1970s it was recognized that some difficult graph partitioning problems can be addressed using SDP. Since then the number of applications of SDP has grown substantially. Another wave of interest in SDP was stimulated by the application of SDP to approximate the solutions to some difficult integer and nonconvex quadratic programming problems. Also, SDP is a special case of convex cone programming (see below). Surveys of SDP can be found in Todd (2001) and Wolkowicz et al. (2000).

i

i i

i

i

i

i

658

book 2008/10/23 page 658 i

Chapter 16. Penalty and Barrier Methods

SDP is a special case of convex cone programming. Nesterov and Nemirovski (1994) applied self-concordance theory in this unifying framework to show that convex cone problems can be solved in polynomial time. For results based on the primal-dual interior-point method for cone programming, see Nesterov and Todd (1998). There are many software packages developed for SDP. Information about them can be found in the sources mentioned in Appendix C.

i

i i

i

i

i

i

book 2008/10/23 page 659 i

Part V

Appendices

i

i i

i

i

book 2008/10/23 page 660 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 661 i

Appendix A

Topics from Linear Algebra

A.1

Introduction

We give a brief overview of various topics in numerical linear algebra. For further information, consult the books by Golub and Van Loan (1996) and Horn and Johnson (1991, reprinted 1994). An n-dimensional vector x is an array of n scalars x1 , x2 , . . . , xn . The notation x represents the array when its elements are arranged in a column, while the notation x T represents the array when its elements are arranged in a row. The collection of all real vectors of dimension n is denoted by n . Vectors are usually denoted by lowercase Roman letters. A matrix is a rectangular array of scalars. If the matrix has m rows and n columns it is referred to as an m × n matrix; if m = n, it is called a square matrix. Matrices are usually denoted by uppercase Roman letters, while their elements are denoted by lowercase letters. For example, the element in row i and column j of the matrix A is denoted by ai,j . The transpose of an m × n matrix A is the n × m matrix AT obtained by interchanging the rows of A with its columns. A square matrix is said to be symmetric if A = AT.

A.2

Eigenvalues

Let A be an n × n matrix. If a scalar λ and a nonzero vector v satisfy Av = λv, then λ is an eigenvalue and v is an eigenvector of the matrix A. The eigenvalues are the solutions to the equation det(A − λI ) = 0, where “det” denotes the determinant. The left-hand side of this equation is a polynomial of degree n called the characteristic equation, and the eigenvalues are the roots of this polynomial. 661

i

i i

i

i

i

i

662

book 2008/10/23 page 662 i

Appendix A. Topics from Linear Algebra

Example A.1 (Eigenvalues and Eigenvectors). Let   2 1 . A= 1 2 The equation det(A − λI ) = (2 − λ)2 − 1 = 0 yields the eigenvalues λ1 = 1 and λ2 = 3. To compute the eigenvectors we solve the system of equations (A−λI )v = 0 for the computed values of λ. We obtain that v1 = ( 1 −1 )T is an eigenvector corresponding to λ1 = 1, and v2 = ( 1 1 )T is an eigenvector corresponding to λ2 = 3. The eigenvectors v1 and v2 are not unique. Any nonzero multiple of an eigenvector is also an eigenvector. If A is symmetric, then its n eigenvalues are all real, and it has n linearly independent eigenvectors corresponding to these eigenvalues. Labeling these eigenvectors v1 , . . . , vn , it is possible to choose them to be orthogonal to each other (that is, viTvj = 0) for i = j and to normalize them so that viTvi = 1. Denoting the corresponding eigenvalues by λ1 , . . . , λn , we can define the matrices V = ( v1

· · · vn )

 = diag { λ1 , . . . , λn } .

and

The matrix V is orthogonal because of the way the eigenvectors were selected. It is easy to verify that AV = V , or that A = V V T. This representation of A is called the spectral decomposition of A.

A.3 Vector and Matrix Norms Norms give a rough measure of the magnitude of the entries in vectors and matrices. They generalize the notion of absolute value for real numbers. In general, a norm · is defined as a real-valued function with the properties that • • • •

x ≥ 0 for all x x = 0 if and only if x = 0 αx = |α| x for all real numbers α x + y ≤ x + y for all x and y.

This definition applies to both vector and matrix norms (in fact, to norms of all types). It is useful but not essential to ask that matrix norms have the additional property • xy ≤ x · y for all x and y whose product xy exists. This last property is satisfied by most commonly used matrix norms. Let us first consider vector norms for vectors of the form x = ( x1

· · · xn )T .

The most commonly used is the Euclidean, or 2-norm,  x2 ≡ x12 + · · · + xn2 .

i

i i

i

i

i

i

A.3. Vector and Matrix Norms

book 2008/10/23 page 663 i

663

Also widely used are the 1-norm x1 ≡

n

|xi |

i=1

and the infinity norm x∞ ≡ max |xi |. 1≤i≤n

These are special cases of the norms xp ≡

1

 n

p

|xi |p

i=1

defined for p ≥ 1. Example A.2 (Vector Norms). Let x = (1, 2, 3)T then x1 = 1 + 2 + 3 = 6 √ √ x2 = 1 + 4 + 9 = 14 ≈ 3.74 x∞ = max { 1, 2, 3 } = 3. In many cases it does not make much difference which norm is used, and so it is sometimes convenient to use the notation x without specifying a specific norm. In software for large problems, it may be preferable to use x∞ . If x = (1, . . . , 1)T, then √ x1 = n, x2 = n, and x∞ = 1. If n is large, then both x1 and x2 will be large even though the entries in x are all equal to one. The infinity norm does not share this property. The most widely used matrix norms are defined in terms of vector norms. If A is a matrix and x is a vector norm, then the induced matrix norm A is defined by A = max Ax . x=1

Every induced matrix norm satisfies Ax ≤ A · x for all vectors x. It is also true that AB ≤ A · B for matrices A and B. The matrix norms corresponding to the vector norms above are A1 = max

1≤j ≤n

n

|Ai,j |

i=1

λmax (ATA) n

= max |Ai,j |,

A2 = A∞

1≤i≤n

j =1

i

i i

i

i

i

i

664

book 2008/10/23 page 664 i

Appendix A. Topics from Linear Algebra

where λmax (ATA) is the largest eigenvalue of ATA. In the special case where A is a square symmetric matrix, we have A2 = |λmax (A)|, where λmax (A) is the eigenvalue of largest magnitude of A. In general, A2 is generally much more expensive to compute than either A1 or A∞ . Example A.3 (Matrix Norms). Let  A=

1 −5 2

3 7 −1

−2 9 6

4 −3 8

 .

Then A1 = max { 1 + 5 + 2, 3 + 7 + 1, 2 + 9 + 6, 4 + 3 + 8 } = max { 8, 11, 17, 15 } = 17 and A∞ = max { 1 + 3 + 2 + 4, 5 + 7 + 9 + 3, 2 + 1 + 6 + 8 } = max { 10, 24, 17 } = 24. The eigenvalues of ATA are { 0, 23.4771, 108.0513, 167.4716 }, so √ A2 = 167.4716 = 12.9411. The condition number of a nonsingular matrix is defined as cond(A) = A · A−1 . Any matrix norm canbe used here. From the definition that cond(I ) = 1, and since   −1 AA  ≤ A A−1 , it follows that cond(A) ≥ 1 for all matrices A. If A is symmetric, and the 2-norm is used, then cond(A) =

λmax , λmin

where λmax is the largest eigenvalue of A in absolute value, and λmin is the smallest. The condition number of a matrix A is an indication of the sensitivity to perturbation of a linear system involving A. See Appendix A.8.

A.4

Systems of Linear Equations

To illustrate the techniques for solving systems of linear equations, we use the example x1 + 2x2 + 4x3 = 1 x1 + 3x2 + 9x3 = 6 x1 + 5x2 + 25x3 = 4.

i

i i

i

i

i

i

A.4. Systems of Linear Equations In matrix form the system looks like  1 2 1 3 1 5

book 2008/10/23 page 665 i

665

4 9 25



x1 x2 x3



  1 = 6 . 4

Denote this system as Ax = b. This system is square, having the same number of equations as variables. The techniques discussed here applies only to square systems. If a system of equations has a unique solution, then the system as well as the matrix A are said to be nonsingular. For the matrix, this is the same as saying that A has an inverse, or that A−1 exists. If A−1 does not exist, then the matrix and the system are singular. The matrix A will be singular if its rows (or equivalently, its columns) are linearly dependent; that is, if one of the rows is a linear combination of the others. The matrix   1 2 3 A= 4 5 6 7 8 9 is singular because the last row is equal to twice the second row minus the first row. A system of equations with a singular matrix A has either no solution or an infinite family of solutions, depending on the components of the right-hand-side vector b. For this particular matrix A, there is no solution if b = (10, 10, 20)T. To see this, subtract twice the second equation minus the first equation from the last equation to obtain 0 = 10, an equation with no solution. On the other hand, if b = (10, 10, 10)T, then the last equation is redundant and can be deleted from the system. This leaves a system of two equations in three unknowns: 1x1 + 2x2 + 3x3 = 10 4x1 + 5x2 + 6x3 = 10. We can solve for any two of the variables in terms of the third. For example, if we solve for x1 and x2 in terms of x3 , we obtain the infinite family of solutions x1 = x3 − 10

and

x2 = 10 − 2x3 ,

where x3 can be chosen arbitrarily. If the matrix A is nonsingular and the inverse matrix A−1 is known, then the solution of the linear system Ax = b can be written as x = A−1 b. However, the techniques that we will describe for solving linear equations will not form A−1 . There are a number of reasons for not forming A−1 . The most notable is that it is both more expensive and unnecessary to compute A−1 than to use the elimination techniques described below. On small problems where most of the coefficients in the matrix are nonzero (a dense matrix), forming the inverse is three times as expensive as applying elimination. On large problems, the savings can be even more dramatic. If the matrix A is large (if the number of variables is large), it is common in practical applications for most of the entries in the matrix to be zero (the matrix will be sparse). The entry in the matrix at row i and column j might represent the connection between two components in a machine (components i and j ), and if the two components are not connected,

i

i i

i

i

i

i

666

book 2008/10/23 page 666 i

Appendix A. Topics from Linear Algebra

then this coefficient will be zero. Since a large machine will have many components, most of which are only connected to a few nearby components, most of the entries in the matrix will be zero. For a sparse matrix it is not unusual for the number of nonzero entries in the matrix to be approximately αn, where n is the number of rows in the matrix. This says that there are about α nonzero entries in each row of the matrix. A dense matrix would have n2 nonzero entries. For a problem with n = 10,000 and α = 5 (5 nonzero entries per row), the sparse matrix would have 50,000 nonzero entries, while the corresponding dense matrix would have 100,000,000 entries, or 2,000 times as many. When the elimination methods described below are applied to sparse matrices, the costs of solving a linear system are usually proportional to the number of nonzero entries, αn. (Here the term “costs” refers to the number of arithmetic operations required.) Special techniques are used that avoid the calculations associated with zero entries, such as adding zero to a number. If on the other hand the inverse A−1 is computed, the costs will normally be proportional to n3 , a dramatically higher cost. (See also the discussion in Appendix A.6.) If n = 10,000 and α = 5, then the sparse matrix could be factored using about 50,000 arithmetic operations, while the corresponding dense matrix would require about 1,000,000,000,000 operations, or 20,000,000 times as many. If algorithms did not take advantage of sparsity, it would not be practical to solve large optimization problems.

A.5

Solving Systems of Linear Equations by Elimination

The most commonly used method for solving systems of linear equations is Gaussian elimination. Carl Friedrich Gauss described this technique in the early 1800s. The name of the method is derived from this reference, but the method is much older than this. We describe the technique using an example. Consider the system 2.0x1 − 4.0x2 − 1.0x3 = 2.0 0.4x1 + 2.2x2 + 1.8x3 = 2.4 0.8x1 − 0.1x2 − 1.4x3 = 5.8. This system will be transformed into an equivalent but simpler system. The new system will be equivalent in the sense that the two systems of equations will have the same solution. The new system will be simpler in the sense that its solution will be easy to compute. To perform the transformation, we subtract multiples of one equation from another in order to eliminate variables. We use the first equation to eliminate x1 from the other two equations. If we subtract 0.2 times the first equation from the second equation, and subtract 0.4 times the first equation from the third equation, we obtain the reduced system 3.0x2 + 2.0x3 = 2.0 1.5x2 − 1.0x3 = 5.0. We now apply elimination to this smaller system, subtracting 0.5 times the first equation from the second to obtain −2.0x3 = 4.0.

i

i i

i

i

i

i

A.5. Solving Systems of Linear Equations by Elimination

book 2008/10/23 page 667 i

667

Elimination transforms the original system into the simpler system 2.0x1 − 4.0x2 − 1.0x3 = 2.0 3.0x2 + 2.0x3 = 2.0 −2.0x3 = 4.0. It is called upper triangular because of the pattern of nonzero coefficients. The third equation gives x3 = −2.0. Then we can substitute this value into the second equation to obtain x2 = 2.0. Finally, we substitute the values of x2 and x3 into the first equation and solve for x1 = 4.0. The technique for solving the triangular system is called backsubstitution (solving for x3 in the third equation, and then substituting its value into the second equation, etc.). The formulas for both elimination and backsubstitution are not difficult to derive. Suppose that the ith equation of the final triangular system is written as n

aˆ ij xj = bˆi ,

j =i

where aˆ ij and bˆi represent the coefficients and right-hand side of the transformed equation respectively. Then the formulas for backsubstitution are xi =

  n

1 ˆ bi − aˆ ij xj aˆ ii j =i+1

for i = n, n − 1, . . . , 1.

From this formula it is clear that the backsubstitution step can be carried out if aˆ ii = 0 for all i, that is, if the triangular system is nonsingular. Hence the algorithm can be applied to any nonsingular triangular system. The cost of backsubstitution can also be determined. There are n steps (one for each xi ), each of which requires 2(n − i) + 1 arithmetic operations ((n − i) multiplications, (n − i − 1) additions, 1 subtraction, and 1 division), so the total number of arithmetic operations is n

[2(n − i) + 1] = n + 2

i=1

n

(n − i) = n + 2

i=1

n−1

i

i=0

= n + 2 × (n − 1)(n − 1 + 1)/2 = n2 . Since the number of coefficients in the simpler system is approximately n2 /2, and since each of these coefficients must be examined in order to determine the solution, any algorithm for solving a triangular system must have costs proportional to n2 —hence backsubstitution is an efficient algorithm for determining the solution. The formulas for elimination are slightly more complicated. Let us assume that the triangular system is overwritten on the original system of equations. Denote the original linear system by Ax = b with the ith equation having the form n

aij xj = bi .

j =1

i

i i

i

i

i

i

668

book 2008/10/23 page 668 i

Appendix A. Topics from Linear Algebra

The central step in elimination is the subtraction of a multiple of the ith equation from the kth equation: akj ← akj −

aki aij aii

for j = i, . . . , n and k = i + 1, . . . , n.

This is carried out for i = 1, . . . , n − 1. Counting operations shows that the cost of elimination is approximately 23 n3 operations if n is large. Notice that elimination is about n times more expensive than backsubstitution. In this and many other algorithms the number of additions and subtractions is almost the same as the number of multiplications and divisions. It is common to count only the latter, and also to treat divisions in the same way as multiplications. We will follow this practice. Hence we will say that backsubstitution requires n2 /2 multiplications, and that elimination requires n3 /3 multiplications. The formulas for elimination will break down if aii = 0. This can happen even if the system of equations is nonsingular. However, with one simple modification, the above technique can be transformed into a general algorithm. As illustrated above, the technique will break down if it is applied to the linear system 0.0x1 − 4.0x2 − 1.0x3 = 2.0 0.4x1 + 2.2x2 + 1.8x3 = 2.4 0.8x1 − 0.1x2 − 1.4x3 = 5.8. If we try to apply elimination, we are attempting to subtract 0.4/0.0 times the first equation from the second. This ratio is infinite, and so the step cannot be carried out. It is easy to see how to fix the method—just interchange the first equation with one of the others. It is common to choose the equation with the largest coefficient (in absolute value) of x1 . If we do this at every stage of elimination, we obtain the upper triangular system 0.8x1 − 0.1x2 − 1.4x3 = 5.8 −4.0x2 − 1.0x3 = 2.0 1.9375x3 = 0.625. Backsubstitution can now be used to obtain the solution (x1 ≈ 7.741936, x2 ≈ −0.580645, x3 ≈ 0.322581). Although it is only necessary to interchange equations when a division by zero will result, it is advisable to perform interchanges at every iteration to select the equation with the largest leading coefficient in absolute value. This is done to control the rounding errors that arise when Gaussian elimination is implemented on a computer. (See Appendix A.8.) This interchange technique is called partial pivoting. There is also a technique called complete pivoting that not only switches rows but also reorders the variables. It is more expensive than partial pivoting, and on most problems does not produce better answers, so it is rarely used. If partial pivoting is used, then Gaussian elimination will not break down (i.e., encounter a zero pivot element) if the system of equations has a unique solution. In this case it is also possible to derive bounds on the error in the solution. (See the Notes.)

i

i i

i

i

i

i

A.6. Gaussian Elimination as a Matrix Factorization

A.6

book 2008/10/23 page 669 i

669

Gaussian Elimination as a Matrix Factorization

There is an alternative point of view of Gaussian elimination that will be useful to us. Consider a linear system written in matrix form Ax = b. Our new point of view will attempt to isolate the influence of the matrix A (often representing a general model of our situation) from the right-hand side b (often representing the data in our specific case). The basis for this point of view will be a representation of the matrix A as a factorization of A into “simpler” matrices. For Gaussian elimination, A is represented in terms of its LU factors A = P LU. The matrix U is upper triangular and corresponds to the upper triangular system of equations that is obtained as a result of Gaussian elimination. The matrix L is lower triangular and is a record of the elimination calculations that were used to produce U . The matrix P (not always present) is a permutation matrix that records the interchanges of equations used during the elimination; the columns of P are a permutation of the columns of the identity matrix. Although the interchanges are done one at a time during the elimination algorithm, they can be collected together as if they were all done at once. Before illustrating the entire factorization, we first would like to look at the matrices P and L. The permutation matrix P serves to reorder the equations. For a four-variable problem, for example, ⎛ ⎞ ⎛ ⎞ ⎞⎛ 0 0 1 0 row3 row1 ⎜ 1 0 0 0 ⎟ ⎜ row2 ⎟ ⎜ row1 ⎟ ⎝ ⎠=⎝ ⎠. ⎠⎝ 0 0 0 1 row3 row4 0 1 0 0 row4 row2 A permutation matrix satisfies P TP = I , so that P −1 = P T. The matrix L records the steps in the elimination process. It is built up from simpler pieces, each of which corresponds to the addition of a multiple of one equation to another. For example, ⎞ ⎛ ⎞ ⎛ ⎞⎛ row1 1 0 0 0 row1 row2 1 0 0 ⎟ ⎜ row2 ⎟ ⎜ ⎟ ⎜0 ⎠=⎝ ⎠. ⎝ ⎠⎝ row3 row3 + 5 row2 0 5 1 0 row4 row4 − 3 row2 0 −3 0 1 Each entry below the main diagonal in L corresponds to an elimination step. We will illustrate this factorization using the 3 × 3 example   1.6 −4.2 −0.8 A = 4.0 1.5 3.0 8.0 −1.0 1.0     0 1 0 1 0 0 8 −1 1 = 0 0 1 0.2 1 0 0 −4 −1 = P LU. 1 0 0 0.5 −0.5 1 0 0 2 The coefficients in U are the coefficients from the final upper triangular system obtained after elimination. The coefficients in L are the multipliers from the elimination.

i

i i

i

i

i

i

670

book 2008/10/23 page 670 i

Appendix A. Topics from Linear Algebra

Before discussing the usage of the factorization, let us look in more detail at how it is obtained. If partial pivoting is used, then the first and third rows are interchanged via     8.0 −1.0 1.0 0 0 1 P1 A = 4.0 1.5 3.0 , where P1 = 0 1 0 . 1.6 −4.2 −0.8 1 0 0 At the first stage of elimination we add −4.0/8.0 = −0.5 times the first equation to the second equation, and add −1.6/8.0 = −0.2 times the first equation to the third equation. These operations can be represented in matrix form as    1 0 0 8.0 −1.0 1.0 L1 (P1 A) = −0.5 1 0 4.0 1.5 3.0 −0.2 0 1 1.6 −4.2 −0.8   8.0 −1.0 1.0 = 0 2.0 2.5 . 0 −4.0 −1.0 At the second and final step, the second and third rows are interchanged:    8.0 −1.0 1.0 1 0 P2 (L1 P1 A) = 0 −4.0 −1.0 , where P2 = 0 0 0 2.0 2.5 0 1 Then elimination is performed using   1 0 0 8.0 L2 (P2 L1 P1 A) = 0 1 0 0 0 0.5 1 0

−1.0 1.0 −4.0 −1.0 2.0 2.5



 =

8 0 0

−1 −4 0

0 1 0

 .

1 −1 2

 .

Combining all of these steps together gives L2 P2 L1 P1 A = U or, since the matrices { Pi } are symmetric, −1 −1 T −1 A = (P1TL−1 1 P2 L2 )U = (P1 L1 P2 L2 )U

with



   1 0 0 1 0 0 L−1 and L−1 0.5 1 0 0 1 0 . 1 = 2 = 0.2 0 1 0 −0.5 1 If desired, these transformations can be combined into the more compressed form A = P LU , but this is not necessary for purposes of calculation. For this example, it is straight−1 forward to check that P1 L−1 1 P2 L2 = P L, for the matrices P and L defined earlier. We now return to our discussion of the factorization and its usage. It is possible to solve the system of equations Ax = b directly from this factorization by computing temporary vectors y and z as follows: Ax = P L 6789 U x = b. y

6 78 9 z

i

i i

i

i

i

i

A.6. Gaussian Elimination as a Matrix Factorization

book 2008/10/23 page 671 i

671

First we solve for z in P z = b. This just corresponds to interchanging the elements in b (the vector z is just a temporary result). Then we solve for y in Ly = z. This system is lower triangular and so it can be solved via “forward” substitution, analogous to backsubstitution (again, y is just a temporary result). Finally, we solve for x in Ux = y via backsubstitution to obtain the solution. Combining the steps gives x = U −1 y = U −1 L−1 z = U −1 L−1 P −1 b = (P LU )−1 b = A−1 b, as expected. If the factorization has already been computed, the cost of these three steps is O(n2 ). It might seem that the storage costs for the factorization would be expensive, since now three matrices must be stored, but this is not necessary. The diagonal entries in L are all equal to 1, and so need not be stored. The remaining entries in L can be stored in the lower triangle of U , which has only zero entries. The matrix P records only the interchanges of rows, and so can be represented by an integer work array that stores the permutation required. Hence the factorization can be overwritten on the original matrix, if an auxiliary integer work array is provided. There are a number of advantages to this approach. First, if several systems of equations must be solved, all having the same matrix A (the same general model) but different right-hand sides b(j ) (different data), then the matrix A need only be factored once, and then this three-step procedure can be applied to each of the right-hand sides in turn. Since the factorization of A is much more expensive (O(n3 )) than the three-step procedure (O(n2 )) this can result in significant savings. Second, the factorization can be used to obtain error bounds on the solution (see the discussion of sensitivity below). Third, the factorization can sometimes be used to check if the matrix A has desired properties such as positive-definiteness (see the discussion of other matrix factorizations below). Since it is not too difficult to compute the inverse of a triangular matrix, it would be possible to use the factorization to compute A−1 via A−1 = U −1 L−1 P −1 . This is not normally recommended, for the reasons discussed in Appendix A.4. We repeat this here because it is now possible to give an example that makes clear the disadvantage of forming the inverse. Consider the matrix ⎞ ⎛ 4 1 0 0 0 0 ⎜1 4 1 0 0 0⎟ ⎟ ⎜ ⎜0 1 4 1 0 0⎟ A=⎜ ⎟. ⎜0 0 1 4 1 0⎟ ⎠ ⎝ 0 0 0 1 4 1 0 0 0 0 1 4

i

i i

i

i

i

i

672

book 2008/10/23 page 672 i

Appendix A. Topics from Linear Algebra

If Gaussian elimination is applied to A, then we obtain the factors P = I , ⎞ ⎛ 1.0000 0 0 0 0 0 0 0 0 0 ⎟ ⎜ 0.2500 1.0000 ⎟ ⎜ 0.2667 1.0000 0 0 0 ⎟ ⎜ 0 L=⎜ ⎟ 0 0.2679 1.0000 0 0 ⎟ ⎜ 0 ⎠ ⎝ 0 0 0 0.2679 1.0000 0 0 0 0 0 0.2679 1.0000 and



4.0000 ⎜ 0 ⎜ ⎜ 0 U =⎜ ⎜ 0 ⎝ 0 0

⎞ 1.0000 0 0 0 0 3.7500 1.0000 0 0 0 ⎟ ⎟ 0 3.7333 1.0000 0 0 ⎟ ⎟. 0 0 3.7321 1.0000 0 ⎟ ⎠ 0 0 0 3.7321 1.0000 0 0 0 0 3.7321

Notice that L and U have the same pattern of nonzero entries as A. However, the inverse of A has the form ⎞ ⎛ 0.2679 −0.0718 0.0192 −0.0052 0.0014 −0.0003 0.2872 −0.0769 0.0206 −0.0055 0.0014 ⎟ ⎜ −0.0718 ⎟ ⎜ 0.0192 −0.0769 0.2886 −0.0773 0.0206 −0.0052 ⎟ ⎜ A−1 = ⎜ ⎟, 0.0206 −0.0773 0.2886 −0.0769 0.0192 ⎟ ⎜ −0.0052 ⎠ ⎝ 0.0014 −0.0055 0.0206 −0.0769 0.2872 −0.0718 −0.0003 0.0014 −0.0052 0.2679 0.0192 −0.0718 and the pattern of nonzero entries is destroyed. Hence, in terms of both storage and computation, A−1 is more expensive to work with than the factors L and U . Care must be taken when factoring sparse matrices. For ⎛ ⎞ 4 1 1 1 1 ⎜1 4 0 0 0⎟ ⎜ ⎟ A = ⎜1 0 4 0 0⎟ ⎝ ⎠ 1 0 0 4 0 1 0 0 0 4 the LU factors are



1 ⎜ 0.25 ⎜ L = ⎜ 0.25 ⎝ 0.25 0.25 and



4 ⎜0 ⎜ U = ⎜0 ⎝ 0 0

0 1 −0.0667 −0.0667 −0.0667

1 3.7500 0 0 0

0 0 1 −0.0714 −0.0714

1 −0.2500 3.7333 0 0

0 0 0 1 −0.0769

⎞ 0 0⎟ ⎟ 0⎟ ⎠ 0 1

⎞ 1 1 −0.2500 −0.2500 ⎟ ⎟ −0.2667 −0.2667 ⎟ . ⎠ 3.7143 −0.2857 0 3.6923

i

i i

i

i

i

i

A.6. Gaussian Elimination as a Matrix Factorization

book 2008/10/23 page 673 i

673

(No row interchanges are required in this example.) Notice that the triangular factors L and U are dense even though the original matrix is sparse. If A is reordered by interchanging the first and last rows and columns, then we obtain the matrix ⎞ ⎛ 4 0 0 0 1 ⎜0 4 0 0 1⎟ ⎜ ⎟ Aˆ = ⎜ 0 0 4 0 1 ⎟ ⎠ ⎝ 0 0 0 4 1 1 1 1 1 4 whose factors are ⎛

1 ⎜ 0 ⎜ Lˆ = ⎜ 0 ⎝ 0 0.25

0 1 0 0 0.25

0 0 1 0 0.25

0 0 0 1 0.25

⎞ 0 0⎟ ⎟ 0⎟, ⎠ 0 1



4 ⎜0 ⎜ Uˆ = ⎜ 0 ⎝ 0 0

0 4 0 0 0

0 0 4 0 0

0 0 0 4 0

⎞ 1 1⎟ ⎟ 1⎟. ⎠ 1 3

The permuted matrix has sparse factors. Sparse matrix software attempts to reorder the rows and columns of a matrix so that the factors are as sparse as possible. The techniques used to do this are heuristic, but they are successful on a wide range of practical problems. These reordering schemes often must make a trade-off between the sparsity of the factors and the accuracy of the computed solution to the corresponding linear system, accepting smaller pivot entries than would be tolerated for dense matrices. Some examples of reordering schemes for sparse matrices are described in the papers by Markowitz (1957) and Suhl and Suhl (1990). We will describe here briefly the technique due to Markowitz. For the sparse matrix A above, the factors L and U had nonzero entries in positions that were zero in the matrix A. The number of such entries is referred to as the amount of fill-in that occurs during elimination. The Markowitz technique attempts to reduce the amount of fill-in during the entire elimination process by reducing the amount of fill-in at every step of the process. This is only a heuristic technique since decisions are only made one step at a time without regard to what might happen several steps later. At the first step of elimination every entry in the matrix is considered as a candidate for the pivot entry. We calculate ri , the number of nonzero entries in row i, and cj , the number of nonzero entries in column j . The pivot entry is chosen as the entry ai,j = 0 in A for which (ri − 1)(cj − 1) is minimal. Then row i is interchanged with row 1, and column j is interchanged with column 1, to bring ai,j into the (1, 1) position of A. Elimination is performed, and the process repeated and applied to the remaining n − 1 columns and rows of the transformed matrix A. The quantity (ri − 1)(cj − 1) is an upper bound on the amount of fill-in that will occur if ai,j is chosen as a pivot entry. If ai,j is ignored, there are ri − 1 remaining nonzero entries in row i, and cj − 1 nonzero entries in column j . Each of these cj − 1 entries would have to be eliminated, and each of these eliminations could introduce up to ri − 1 new nonzero entries into the corresponding row.

i

i i

i

i

i

i

674

book 2008/10/23 page 674 i

Appendix A. Topics from Linear Algebra

There is one other detail that is commonly incorporated into the choice of the pivot entry. There is a danger that the pivot entry ai,j will be close to zero, leading to numerical difficulties. It is useful to insist that |ai,j | ≥ , where  is some tolerance for zero that may depend on the other entries in A. If this test is violated, then ai,j is rejected as a pivot entry, and the “next best” candidate pivot entry is considered. (“Next best” is measured in terms of (ri − 1)(cj − 1).) If the tolerance  is small, then it is less likely that candidate pivot entries will be rejected. If no pivot entries are rejected, then the choice of pivot entries depends only on the sparsity pattern of the matrix (the pattern of zero and nonzero entries). This means that the elimination scheme can be analyzed prior to performing elimination, and a storage scheme set up to handle all the interchanges and fill-in that will occur. This is referred to as a symbolic factorization. The sparsity pattern of a matrix can be represented in a condensed form and can be manipulated more efficiently than the data for the matrix itself. With the symbolic factorization available, the actual numerical factorization can be performed to solve the linear system. Because of the possibility of small pivots, the pivot choices made during the symbolic factorization might have to be modified, with the potential for increases in the amount of computation and storage required. Example A.4 (Sparse Matrix Factorization). Consider the sparse matrix ⎛ ⎞ 3 1 0 0 0 ⎜0 0 1 2 1⎟ ⎜ ⎟ A = ⎜4 0 0 0 2⎟. ⎝ ⎠ 0 2 0 0 0 0 0 5 1 3 The number of nonzero entries in each row is given by the array r = (2

3

2

1

3)

and the number of nonzero entries in each column is given by c = (2

2

2

2

3).

We can calculate (ri − 1)(cj − 1) for each nonzero entry in A: ⎛ ⎞ 1 1 − − − ⎜− − 2 2 4 ⎟ ⎜ ⎟ ⎜ 1 − − − 2 ⎟. ⎝ ⎠ − 0 − − − − − 2 2 4 The smallest of these values is 0 and occurs at position (4, 2), so the pivot entry is a4,2 . This result predicts that no fill-in will occur if this pivot entry is used. If we interchange row 4 with row 1, and column 2 with column 1, then A is transformed into ⎛ ⎞ 2 0 0 0 0 ⎜0 0 1 2 1⎟ ⎜ ⎟ A = ⎜0 4 0 0 2⎟. ⎝ ⎠ 1 3 0 0 0 0 0 5 1 3

i

i i

i

i

i

i

A.6. Gaussian Elimination as a Matrix Factorization

book 2008/10/23 page 675 i

675

After elimination we obtain ⎛

2 ⎜0 ⎜ A = ⎜0 ⎝ 0 0

0 0 4 3 0

0 1 0 0 5

⎞ 0 1⎟ ⎟ 2⎟. ⎠ 0 3

0 2 0 0 1

Now the process repeats. The number of nonzero entries in the remaining rows and columns are given by the arrays r = (−

3

2

1

3)

c = (−

and

2

2

2

3).

Again, we calculate (ri − 1)(cj − 1) for each nonzero entry in A: ⎛

− ⎜− ⎜ ⎜− ⎝ − −

− − 1 0 −

− 2 − − 2

⎞ − 4⎟ ⎟ 2 ⎟. ⎠ − 4

− 2 − − 2

The smallest value is 0 and occurs at position (4, 2), so the pivot entry is a4,2 . And so on. Note that, if |a4,2 | had been small, this entry would have been rejected as a pivot entry, and a3,2 considered instead.

A.6.1

Sparse Matrix Storage

The costs of storing and factoring a sparse matrix are somewhat higher than was suggested above, because there is overhead associated with sparse matrices. This overhead is a consequence of the special storage techniques used to represent sparse matrices on a computer. Before discussing sparse matrix storage, let us look at a dense matrix 

1 1 1

2 3 5

4 9 25

 .

A dense matrix is stored on the computer one entry after another. In FORTRAN this is done one column at a time: 1, 1, 1, 2, 3, 5, 4, 9, 25. Nine storage locations are needed to store the nine entries in the matrix. Now consider the sparse matrix ⎛

1 ⎜2 ⎜ A = ⎜0 ⎝ 0 0

3 0 4 0 0

0 5 0 6 0

0 0 0 0 7

⎞ 0 0⎟ ⎟ 8⎟. ⎠ 0 9

i

i i

i

i

i

i

676

book 2008/10/23 page 676 i

Appendix A. Topics from Linear Algebra

If this matrix were written out as a dense matrix, 25 storage locations would be needed. If we just stored the nonzero entries in the array AVAL, AVAL = { 1, 2, 3, 4, 5, 6, 7, 8, 9 } , only nine locations would be needed, but it would not be possible to reconstruct the matrix, since the locations of these entries have not been specified. Clearly a more elaborate storage scheme must be used. We will describe one technique for storing a sparse matrix. As with the dense matrix, we will store it one column at a time. For each column we will indicate the number of nonzero entries in that column. For each entry we will record the row of the entry and its value. This example would be represented as Column 1 : Column 2 : Column 3 : Column 4 : Column 5 :

2, (1 : 1), (2 : 2) 2, (1 : 3), (3 : 4) 2, (2 : 5), (4 : 6) 1, (5 : 7) 2, (3 : 8), (5 : 9).

In the computer, this information could be represented using three arrays: the array AVAL above, an array NCOL that records the number of nonzero entries in each column, and an array IROW that records the rows where these entries occur: AVAL = { 1, 2, 3, 4, 5, 6, 7, 8, 9 } NCOL = { 2, 2, 2, 1, 2 } IROW = { 1, 2, 1, 3, 2, 4, 5, 3, 5 } . Some effort is required to identify an entry in the matrix. To identify the entries in column 3 of the matrix, we first look at array NCOL to determine that these entries are in positions 5 and 6 or AVAL (NCOL indicates that there are two entries each in columns 1 and 2 of A, and hence the entries for column 3 start in positions 5; since there are two such entries, they are in positions 5 and 6). Then from positions 5 and 6 of IROW we know that these entries are in rows 2 and 4. Hence A2,3 = 5 and A4,3 = 6. The sparse representation of this matrix requires 23 storage locations, 14 integer locations for the indexing information, and 9 real locations for the numbers themselves. (Integer storage can require less space than real storage on some computers.) Since the dense representation requires only 25 entries, this is not much of a savings. However, if this matrix were 100 × 100 with at most 2 nonzero entries per column, then the savings would be more dramatic. The dense representation of such a matrix would require 1002 = 10,000 locations, whereas the sparse representation would require at most 500, of which 300 would be integer locations.

A.7

Other Matrix Factorizations

We have previously discussed the LU factorization of a square matrix and the spectral decomposition of a symmetric matrix. There are three other matrix factorizations that are of use to us as we examine various optimization problems. Two are minor modifications to the

i

i i

i

i

i

i

A.7. Other Matrix Factorizations

book 2008/10/23 page 677 i

677

LU factorization discussed in the previous section and are used to factor positive definite matrices. (A brief discussion of positive-definite matrices is given below.) The third is an orthogonal factorization of a (possibly rectangular) matrix that is based on different techniques.

A.7.1

Positive-Definite Matrices

A symmetric matrix A is positive definite if and only if x TAx > 0 for all nonzero vectors x. This can be a difficult condition to verify, but there are equivalent definitions that are sometimes more practical. For example, A will be positive definite if all of its eigenvalues are positive. Also, if Gaussian elimination is applied to A without pivoting to transform A into upper triangular form ⎛u u ··· u ⎞ 1,1

⎜ A→U =⎜ ⎝

1,2

u2,2 0

··· .. .

1,n

u2,n ⎟ .. ⎟ ⎠ . un,n

and if ui,i > 0 for all i, then A is positive definite. Similarly a symmetric matrix A is • positive semidefinite if x TAx ≥ 0 for all x (or equivalently, all the eigenvalues of A are nonnegative), • negative definite if x TAx < 0 for all x = 0 (all the eigenvalues of A are negative), • negative semidefinite if x TAx ≤ 0 for all x (all the eigenvalues of A are nonpositive), • indefinite if x TAx can take on both positive and negative values (A has both positive and negative eigenvalues). A positive-definite matrix is automatically positive semidefinite, and likewise a negativedefinite matrix is automatically negative semidefinite. Examples of these definitions are given below. Example A.5 (Positive-Definite Matrices). Consider the matrix   4 1 0 A= 1 5 2 . 0 2 6 Then x TAx = 4x12 + 2x1 x2 + 5x22 + 4x2 x3 + 6x32 = 3x12 + 3x22 + 2x32 + (x1 + x2 )2 + (x2 + 2x3 )2 > 0 if x = 0. So A is positive definite. If Gaussian elimination is applied to A, then   4 1 0 A → U = 0 4.75 2 0 0 5.1579

i

i i

i

i

i

i

678

book 2008/10/23 page 678 i

Appendix A. Topics from Linear Algebra

and all the diagonal elements of U are positive. The eigenvalues of A, { 2.8549, 4.4760, 7.6691 } , are also all positive. The matrix

 B=

4 2 0

2 6 2

0 2



4 5

is positive semidefinite but not positive definite. To see this, form x TBx = 4x12 + 4x1 x2 + 6x22 + 4x2 x3 + 45 x32 = (2x1 + x2 )2 + 5(x2 + 25 x3 )2 ≥ 0. If x = ( 15 , − 25 , 1)T, then x TBx = 0. When Gaussian elimination is applied to B,  B→U =

4 0 0

2 5 0

0 2 0



and the diagonal entries in U are nonnegative, with u3,3 = 0. The eigenvalues of B are { 0, 3.1284, 7.6716 }. The matrix   3 5 0 C= 5 4 7 0 7 2 is indefinite. For x = (1, 0, 0)T, we have x TCx = 3 > 0, but for x = (1, −1, 0)T, we have x TCx = −3 < 0. Gaussian elimination applied to C produces  C→U =

3 0 0

5 −4.3333 0

0 7 13.3077



and the matrix U has both positive and negative diagonal entries. The eigenvalues of C are also both positive and negative: { −5.4885, 2.6662, 11.8223 }. The matrix −A is negative definite, and −B is negative semidefinite.

A.7.2 The LDLT and Cholesky Factorizations These two matrix factorizations are primarily of interest when factoring a positive-definite matrix A, although variants of the LDLT factorization can be applied to more general symmetric matrices. They are used in nonlinear optimization problems to represent the Hessian matrix of the objective function. If A is symmetric and positive definite, it can be shown that Gaussian elimination can always be applied without partial pivoting, with no danger of the method trying to divide by zero, and with no danger of near-zero pivots that can lead to numerical difficulties.

i

i i

i

i

i

i

A.7. Other Matrix Factorizations

book 2008/10/23 page 679 i

679

If no row interchanges are used, the LU factorization takes the form A = LU. The first two factorizations are obtained by manipulating this formula. Let D be the diagonal matrix whose entries are the diagonal entries of U : di,i = ui,i . Then define Uˆ = D −1 U so that D Uˆ = U . Hence A = LD Uˆ . If A is positive definite, then it is also symmetric, so that AT = Uˆ TD TLT = Uˆ TDLT = A = LD Uˆ . It is then easy to verify that Uˆ = LT, so that A = LDLT. This is the first of the new factorizations, a factorization of A into the product of a lower triangular matrix, a diagonal matrix, and the transpose of the lower triangular matrix. Slightly more can be deduced. If A is positive definite, then x TAx > 0 for all x = 0. Using the factorization, 0 < x TAx = x TLDLTx = (LTx)TD(LTx) ≡ y TDy, where y = LTx. Since L is nonsingular (it is triangular and all of its diagonal entries are equal to 1), y = 0 if and only if x = 0. Hence 0 < y TDy =



di,i yi2

i

for all y = 0. This can happen only if di,i > 0 for all i. Hence D is a diagonal matrix with positive diagonal entries. It should be noted that the reverse is also true; i.e., if A can be represented as A = LDLT, where D has positive diagonal entries, then A must be symmetric and positive definite. If we discover that di,i ≤ 0 at some stage during the computation of the factorization, then A is not positive definite. This property will be useful when we apply Newton’s method to multidimensional optimization problems (see Section 11.4). Example A.6 (A = LDLT). To illustrate this factorization, consider the positive-definite matrix   4 −2 2 A = −2 2 −3 . 2 −3 14 Then A can be represented as LDLT, where  L=

1 0 0 −0.5 1 0 0.5 −2 1



 and

D=

4 0 0

0 1 0

0 0 9

 .

i

i i

i

i

i

i

680

book 2008/10/23 page 680 i

Appendix A. Topics from Linear Algebra

The second factorization is obtained easily from the first. Since D has positive diagonal entries we can write ˆ D = Dˆ D, where Dˆ is a diagonal matrix with dˆi,i = di,i . If we then define ˆ Lˆ = LD, then Lˆ is also a lower triangular matrix, and A = Lˆ Lˆ T. The ˆ is often omitted, and we simply write A = LLT. This is the second of the factorizations, also referred to as a Cholesky factorization. Example A.7 (LDLT to Cholesky). We can modify the above factorization to obtain  Dˆ = and

2 0 0

 Lˆ = LDˆ =

so that

 A = Lˆ Lˆ T =

2 −1 1

0 1 −2

0 1 0

2 −1 1 0 0 3



0 0 3



0 1 −2

0 0 3

2 0 0

−1 1 0

 ,

1 −2 3

 .

It is also possible to compute the coefficients of the Cholesky factorization directly, by comparing coefficients of A and LLT. Example A.8 (Cholesky Factorization). of LLT: 2 a11 = l11 a2,1 = l2,1 l11

→ →

2 2 a2,2 = l2,1 + l2,2 a3,1 = l3,1 l11 a3,2 = l3,1 l1,1 + l3,2 l2,2

→ → →

2 2 2 a3,3 = l3,1 + l3,2 + l3,3



We compare the coefficients of A with those

√ √ l11 = a1,1 = 4 = 2 l2,1 = a2,1 / l1,1 = −2/2 = −1 √ 2 l2,2 = a2,2 − l2,1 = 2−1=1 l3,1 = a3,1 / l3,1 = 2/1 = 1 l3,2 = (a  3,2 − l3,1 l1,1 )/ l2,2 =√−2 2 2 l3,3 = a3,3 − l3,1 − l3,2 = 14 − 1 − 4 = 3.

Because of the symmetry in the matrix A, the computational costs of the LDLT and Cholesky factorizations are about half those of the P LU factorization of a general matrix.

i

i i

i

i

i

i

A.7. Other Matrix Factorizations

681

=

=

A

=

book 2008/10/23 page 681 i

Q

R

A

=

Q

R

Figure A.1. Forms of orthogonal factorizations.

A.7.3 An Orthogonal Matrix Factorization The third matrix factorization is based on entirely different principles and applies in a quite different setting. It uses orthogonal transformations and can be applied to any matrix. The matrix A need not have an inverse; in fact, the matrix need not even be square. It is typically used when A is rectangular, in particular, when A has more rows than columns. Its most common usage is in the context of least-squares problems, but it is frequently used to represent the linear constraints in an optimization problem. It is called a QR factorization because it represents A as A = QR, where Q is an orthogonal matrix (i.e., QTQ = I ) and R is an upper triangular (or “right” triangular) matrix. There is a slight ambiguity in the definition of the QR factorization. If A is an m × n matrix and m > n, then there are two forms of this factorization. The first chooses Q to be the same size as A, and then R is n × n; the second chooses R to be the same size as A, and then Q is m × m. See Figure A.1. The first form is all that is normally required to solve least-squares problems; the second form is often more useful when solving constrained optimization problems. There are three techniques that are commonly used to compute the QR factorization of a matrix A. In the absence of rounding errors, they all can be considered equivalent, but on a computer there are important differences in their properties. The oldest, and the one most familiar to mathematicians, is called the Gram–Schmidt orthogonalization process. Its emphasis is on the orthogonal matrix Q, and it is often described without the triangular matrix R being mentioned. It should be noted that the traditional formulas for Gram–Schmidt orthogonalization have undesirable computational properties, but that a slight modification of the formulas is safe to use. The other two techniques are closer in spirit to Gaussian elimination in that they introduce zeroes into the matrix A so as to transform it into an upper triangular matrix. The version based on Givens rotations introduces one zero at a time, while the version based on Householder reflections introduces a whole column of zeroes at a time. We will only describe in detail the Householder approach. Orthogonal matrix factorizations are most often used when solving least-squares problems. To see why, consider a least-squares problem written in the form minimize f (x) = Ax − b22 , where A is an m × n matrix with m ≥ n. Least-squares problems cannot be solved by applying elimination to the matrix A. When linear systems of equations are solved, the

i

i i

i

i

i

i

682

book 2008/10/23 page 682 i

Appendix A. Topics from Linear Algebra

techniques of elimination result in a sequence of equivalent linear systems. Elimination is not applied to least-squares problems because the techniques of elimination do not leave the least-squares problem unchanged. However, if P is an orthogonal matrix so that P TP = I , then P y22 = (P y)T(P y) = y TP TP y = y Ty = y22 ; that is, an orthogonal transformation does not affect the 2-norm of a vector. Hence Ax − b22 = P (Ax − b)22 and so orthogonal transformations can be used to generate a sequence of equivalent leastsquares problems. Just as with linear equations, it is easy to solve least-squares problems when A is upper triangular. This is illustrated in the following example. Example A.9 (Triangular Least-Squares Problems). Consider the least-squares problem minimize f (x) = Ax − b22 with



5 ⎜0 A=⎝ 0 0

2 3 0 0

⎞ 1 4⎟ ⎠, 2 0



⎞ 13 ⎜ 17 ⎟ b = ⎝ ⎠. 4 12

This is equivalent to solving minimize (5x1 + 2x2 + 1x3 − 13)2 + (3x2 + 4x3 − 17)2 + (2x3 − 4)2 + (12)2 . x

The solution can be obtained via backsubstitution. This is a sum of squared terms, and the smallest value each term can achieve is zero. The term (12)2 remains unchanged no matter what the values of the xi are. The other three terms can be made equal to zero by solving the triangular system of equations 5x1 + 2x2 + 1x3 = 13 3x2 + 4x3 = 17 2x3 = 4. The solution is x = (x1 , x2 , x3 )T = (1, 3, 2)T. If the matrix A has been factored as A = QR, where QTQ = I and R is upper triangular, then  2 Ax − b2 = QRx − b2 = Rx − (QTb) . 2

2

2

Hence the QR factorization allows us to transform a general least-squares problem into a triangular least-squares problem that can be solved via backsubstitution. Techniques for forming the QR factorization are discussed in the book by Golub and Van Loan (1996). An example of a QR factorization is given below.

i

i i

i

i

i

i

A.8. Sensitivity (Conditioning)

book 2008/10/23 page 683 i

683

Figure A.2. Fitting three quadratic functions. Example A.10 (The QR Factorization). Let ⎛

3 ⎜2 A=⎝ 5 2

4 7 3 9

⎞ 2 1⎟ ⎠. 6 1

Then A = QR, where ⎛

Q = P(1) P(2) P(3)

−0.4629 ⎜ −0.3086 =⎝ −0.7715 −0.3086

0.0252 −0.4934 0.4738 −0.7290

0.8526 0.0761 −0.4232 −0.2970

⎞ 0.2412 −0.8096 ⎟ ⎠ −0.0345 0.5340

and ⎛

R = A(3) = P(3) A(2)

−6.4807 0 ⎜ =⎝ 0 0

⎞ −9.1039 −6.1721 −8.4923 1.6710 ⎟ ⎠. 0 −1.0548 0 0

It can be verified that QTQ = I (except for rounding errors).

A.8

Sensitivity (Conditioning)

If we had the ability to compute exactly, with no rounding errors, then systems of linear equations could be divided cleanly into those that were singular and those that were nonsingular. When data and calculations are inaccurate, however, there is not such a clear distinction between singular and nonsingular systems. Before giving a precise discussion of conditioning let us look at a set of examples. They are variants of the data-fitting problem in Chapter 1. Consider fitting a quadratic function to the three data sets illustrated in Figure A.2. The only difference between the three data sets is the position of the middle data point.

i

i i

i

i

i

i

684

book 2008/10/23 page 684 i

Appendix A. Topics from Linear Algebra The coefficient matrix for this problem is   1 0.01 0.0001 A = 1 0.02 0.0004 1 0.03 0.0009

and the three sets of right-hand sides are     1 1 b(1) = 0.99 , b(2) = 1 , 1 1 The three sets of coefficients are   1.03 x(1) = −4.00 , 100.00

x(2)

  1 = 0 , 0

 b(3) =

 x(3) =

1 1.01 1

 .

0.97 4.00 −100.00

 ;

the fits are illustrated in Figure A.2. These examples represent ill-conditioned problems; that is, a small change in the data leads to a large change in the solution. In this case, the change in the data is 0.01 but the change in the third component of the solution is 100. The change in the data has been magnified by 10,000. Hence the solution is “sensitive” to changes in the data. In this case the change in the data was deliberate, and it represented the solution of a different problem. The reason that ill-conditioning is worrisome is that often the data in a problem will be inaccurate. The numbers may be subject to measurement error, or they may be the results of earlier calculations and be subject to computer errors. This means that the “true” data will be unknown and that the numbers used in the calculations will be inaccurate. If the problem is ill conditioned, then the errors in the solution (to the “true” problem) can be large, even if no errors are made when solving the linear system of equations. Going back to the example, let us now suppose that b(2) represents the exact data, and that b(1) and b(3) are in error. The exact data are on the line y = 1. The other two fits are dramatically different, both in their coefficients and in their graphs. However, all three fits go close to the data point (1, 1), with “errors” of at most 0.01. The size of these “residuals” is proportional to the errors in the data, even though this problem is ill conditioned. This is typical for data-fitting problems. We can quantify the sensitivity of a linear system with respect to changes in the data using the condition number of its matrix: cond(A) = A · A−1 . Consider, for example, a diagonal matrix A where Ai,i = 1 except for An,n = 10−n . If we use the 2-norm, then cond(A) = 10n , and the condition number tends to infinity as A tends towards a singular matrix. This is true in general—the larger the condition number, the closer A is to being singular. Here “closeness to singularity” is measured relative to the norm of A. For the example at the beginning of this section, cond(A) = 2.1234 × 104 . We would now like to show how the condition number is related to the errors in the solution of linear systems. Consider the case where all the errors are in the matrix A: Ax = b

and

(A + E)xˆ = b,

i

i i

i

i

i

i

A.8. Sensitivity (Conditioning)

book 2008/10/23 page 685 i

685

with E =  A. (Here the first system represents the “true” data, and the second is corrupted by errors E.) The lemma below shows that we can bound the change in the solution by   xˆ − x    ≤ cond(A). xˆ  Thus perturbations in the data matrix are magnified by cond(A) when the solution of the linear system is computed. A similar result holds for perturbations in the right-hand side. Lemma A.11. Let A be a square nonsingular matrix. Let x and xˆ be the solutions to the linear systems Ax = b and (A + E)xˆ = b, with E =  A. Then

  xˆ − x    ≤ cond(A). xˆ 

Proof. From E xˆ = b − Axˆ = Ax − Axˆ we obtain

ˆ x − xˆ = A−1 E x.

Taking norms gives             x − xˆ  = A−1 E xˆ  ≤ A−1  E xˆ  = A−1  ( A) xˆ  .   Since cond(A) = A · A−1 , the result follows. The above result has even greater significance. If Gaussian elimination with partial pivoting is used to solve the linear system Ax = b, then it can be shown that the computed solution xˆ is the exact solution to a perturbed linear system of the form (A + E)x = b, where E = Cmach A. (The constant C is usually near 1; the constant depends on the number of equations in the system, and the size of the intermediate calculations relative to the size of the original matrix A.) This is a most impressive result. Note that errors of size mach are made when we store the matrix A in the computer, so that just entering the problem can cause the coefficient matrix A to be perturbed. Hence even if we could compute the exact solution to the stored system we could not guarantee a better error bound than that given by Gaussian elimination. Other methods, in particular computing the solution via the computation of A−1 , do not satisfy a result of this type. This result also shows that Gaussian elimination will always produce a solution with small residuals. Since (A + E)xˆ = b with E = Cmach A (and C is the constant mentioned above) we can easily deduce that   Axˆ − b   ≤ Cmach . A · xˆ 

i

i i

i

i

i

i

686

book 2008/10/23 page 686 i

Appendix A. Topics from Linear Algebra

Hence the scaled residuals will always be proportional to mach , even if the matrix is nearly singular. Let us examine these bounds for the data-fitting example above. We will consider the true solution to be x(2) = (1, 0, 0)T, and the computed solution to be x(1) = (1.03, −4.00, 100.00)T. The errors are proportional to  = 0.01, which is much larger than mach ≈ 10−7 . For the errors in the parameters x we obtain   xˆ − x  100.0800 = ≤ cond(A) = 212.3442, x and for the residuals we obtain −5

5.7674 × 10

  Axˆ − b   ≤  = 0.01. = A · xˆ 

The bounds on the errors are worst-case bounds, and hence give only upper bounds on the errors. There is a subtle point underlying the above comments. All of these error bounds are general error bounds made without regard to any special properties of the matrix A or the right-hand side b. They are worst-case bounds made before the system is solved. As a result, they can be pessimistic for particular linear systems. They are useful in understanding the general properties of linear systems and algorithms to solve them, but they are not always accurate error bounds. If accurate error bounds are desired, then they can be computed based on the particular linear system that is being solved. Although we have already indicated that the condition number is a useful theoretical tool for analyzing linear systems, it is not so clear that it is a practical tool. Its value depends on knowing A−1 , and computing A−1 is three times as expensive as solving the linear system—a lot to pay for an error bound. However, it is possible to estimate the condition number at low cost as a by-product of solving a system of linear equations, and software packages such as Lapack provide this capability. In summary, if a system of linear equations is solved using Gaussian elimination with partial pivoting, then a computed solution with near-optimal accuracy can be obtained. This does not mean that the computed solution will be near the true solution, but rather that the errors in the computed solution will be proportional to the condition number of the coefficient matrix. (This result also applies to cases where the data in the coefficient matrix or the right-hand side are either inaccurate or subject to perturbations.) If the matrix is ill conditioned (i.e., the condition number is large), then the errors will be large, and if the matrix is well conditioned, the errors will be small. Regardless of the conditioning of the matrix, however, the residuals will be small. Software for Gaussian elimination can provide an estimate of the condition number so that the accuracy of the solution can be estimated.

A.9 The Sherman–Morrison Formula If the inverse of a matrix is known, but then the matrix is perturbed, it is useful to be able to compute the inverse of the perturbed matrix efficiently. The Sherman–Morrison formula can be used to do this, for perturbations of a particular form.

i

i i

i

i

i

i

A.9. The Sherman–Morrison Formula

book 2008/10/23 page 687 i

687

Suppose that the original matrix is A and the perturbed matrix is Aˆ = A − uv T, where u and v are vectors. Then −1 Aˆ = A−1 + α(A−1 u)(v TA−1 ),

where α=

1 . 1 − v TA−1 u

This is the Sherman–Morrison formula. It is easy to verify that this formula is correct by checking that (A−1 + α(A−1 u)(v TA−1 )) × (A − uv T) = I. It is also easy to verify that A−1 exists if and only if v TA−1 u = 1, that is, if and only if the scalar α is finite. Example A.12 (Sherman–Morrison Formula). If     1 0 0 1 A= 0 2 0 , u= 1 , 0 0 3 1

 v=

and

−1 4 −1

 ,

then it is easy to calculate A−1 but not as easy to compute the inverse of   2 −4 1 T ˆ A = A − uv = 1 −2 1 . 1 −4 4 In this case

⎛1

0

A−1 = ⎝ 0

1 2

0⎞ 0⎠,

0

0

1 3

⎛1⎞ A−1 u = ⎝ 12 ⎠ ,

v TA−1 = ( −1

2

− 13 ) ,

1 3

and α = 1/(1 − v TA−1 u) = 3, so the Sherman–Morrison formula gives ⎞ ⎛ −2 6 −1 −1 Aˆ = A−1 + α(A−1 u)(v TA−1 ) = ⎝ − 32 72 − 12 ⎠ . −1 A perturbation of the form

2

0

Aˆ = A − uv T

is called a “rank-one” perturbation because uv T is a matrix whose rank is equal to one. The change to the basis matrix at an iteration of the simplex method corresponds to a change of this type. For example, suppose that the current basis matrix is ⎛ ⎞ −1 −4 −5 4 8 5 −1 ⎟ ⎜ 1 A=⎝ ⎠. −1 7 4 4 9 8 7 1

i

i i

i

i

i

i

688

book 2008/10/23 page 688 i

Appendix A. Topics from Linear Algebra

If at the current iteration the third column is replaced by (6 then



−1 1 ⎜ Aˆ = ⎝ −1 9

−3 −4 8 7 8

4

−9 )T ,

⎞ 6 4 −3 −1 ⎟ T ⎠ = A − uv 4 4 −9 1

with u = ( −11

8

0

16 )T

and

v = (0

0

1

0).

The Sherman–Morrison formula is of great value when implementing algorithms, such as the simplex method, that are based on updating of matrices. There is a generalization of the formula to the case where Aˆ = A − U V T, where U and V are matrices with k > 1 columns. (This will be a rank-k perturbation to the matrix if the columns of U and V are linearly independent.) In this case, −1 Aˆ = A−1 + (A−1 U )α(V TA−1 ),

where α = (I −V TA−1 U )−1 . Here, α is a k ×k matrix. This generalization is often referred to as the Sherman–Morrison–Woodbury formula.

A.10

Notes

Gaussian Elimination—We mentioned that it is possible to derive bounds on the error in the computed solution. In fact it can be shown that Gaussian elimination is as good an algorithm as you could hope for solving this problem. If Gaussian elimination with partial pivoting is applied to the system Ax = b, then the computed solution xˆ can be shown to be the exact solution to a “nearby” linear system (A + E)xˆ = b, where E is some (unknown) perturbation to the matrix A. The size of the perturbation E is not predictable in advance, but for most problems E is comparable to the rounding errors made when storing the matrix A in the computer. Hence the simple act of storing the problem on the computer can introduce errors comparable to the errors incurred by using Gaussian elimination. It would be hard to think of a more favorable result. Return to Appendix A.8 for a detailed discussion of these ideas. The most obvious reasons for using elimination techniques instead of computing the matrix inverse are based on the costs of the computations. However, there are other reasons. If elimination is used, then the computed solution is the exact solution to a nearby problem, but this is not guaranteed if the solution is obtained using a computed inverse. Elimination is also more flexible: As a side effect of elimination it is possible to compute Av, ATv,

i

i i

i

i

i

i

A.10. Notes

book 2008/10/23 page 689 i

689

A−1 v, and A−T v for any vector v. If the inverse is computed, then both A and A−1 must be stored to do this, doubling the storage costs for the algorithm. The method given here for solving linear equations is the most traditional as well as the most widely used, but it is not the most efficient. There are methods for solving linear equations that have lower asymptotic costs than elimination (costs of O(nω ) with ω < 3), although they are only more efficient in practice for larger values of n (n ≥ 100 or more, depending on the method). They are discussed in the paper by Higham (1990). Sparse Matrices—Several other schemes for storing sparse matrices have been proposed. The scheme given above has deficiencies; for example, to modify an entry in column 72 of the matrix, the algorithm would have to step through the storage locations of the first 71 columns of the matrix. More elaborate schemes allow more direct access to entries in the matrix. For example, it might be useful to have an auxiliary integer array JCOL that indicated the location of the first entry in each column within the arrays AVAL and IROW. For the above example JCOL = { 1, 3, 5, 7, 8 }. The storage scheme is often related to the operations that must be performed on the matrix. For more information on sparse matrices, see the books by Davis (2006); George and Liu (1981); and Saad (2003). Sherman–Morrison Formula—A detailed discussion of the Sherman–Morrison formula and related formulas can be found in the survey paper by Hager (1989). Although it is routine to refer to the Sherman–Morrison formula and the Sherman–Morrison–Woodbury formula, these formulas were first discovered by others. The survey paper gives detailed citations of this earlier work.

i

i i

i

i

book 2008/10/23 page 690 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 691 i

Appendix B

Other Fundamentals

B.1

Introduction

This appendix gives a brief introduction to some background ideas that are used in various places throughout the book. In many cases, this material may be familiar, but a limited discussion is provided here in an attempt to make the book self-contained. Further information on these topics can be found in a wide variety of sources. Some sample references are the following: • ComputerArithmetic—T. Sauer, Numerical Analysis, Addison-Wesley (Boston), 2006. • Big-O Notation—J. M. Ortega and W. C. Rheinboldt, Iterative Solution of Nonlinear Equations in Several Variables, Academic Press (New York), 1970. Reprinted by SIAM (Philadelphia), 2000. • The Gradient, Hessian, and Jacobian—R. Courant and D. Hilbert, Methods of Mathematical Physics, Volume I, Interscience Press (New York), 1953. Reprinted by Wiley-Interscience (New York), 1989. • Continuous Functions and the Implicit Function Theorem—R. Creighton Buck, Advanced Calculus (Third Edition), McGraw–Hill (New York), 1978. Reprinted by Waveland Press (Long Grove, IL), 2003.

B.2

Computer Arithmetic

The arithmetic used by computers is not the same as the “pencil and paper” arithmetic that most of us learned as children. The differences are not great but their effects can sometimes be dramatic, particularly if the problem being solved is sensitive to small changes in its data. On most computers, arithmetic is performed according to the IEEE standard, and our discussion here will reflect that standard. It will not be necessary for us to have a detailed understanding of computer arithmetic, and the description here will be brief. A more complete discussion can be found in the reference given above. There are two types of numbers used in computer calculations, integer and real. (“Real” arithmetic is often called floating-point arithmetic for historical reasons.) Integer 691

i

i i

i

i

i

i

692

book 2008/10/23 page 692 i

Appendix B. Other Fundamentals

numbers behave much as we are used to, that is, if two integers are added together, then the result is another integer, and no error is made in the calculation. The only unusual property of computer integers is that there are only finitely many of them. On many computers an integer is stored using 32 bits (32 binary digits). This means that at most 232 = 4, 294, 967, 296 distinct integers can be represented. As a result there is a biggest integer, 2, 147, 483, 647 and a smallest integer, −2, 147, 483, 648. (The particular values given here are based on the IEEE standard for computer arithmetic.) If an attempt is made to compute an integer outside of this range, an overflow occurs. The situation for “real” arithmetic is more complicated. Real numbers are represented in a form of scientific notation, for example, 0.5167 × 10−6 . Each number consists of a mantissa (0.5167) and an exponent (−6). We will represent numbers here using decimal digits, but the computer will normally use binary digits. Just as with integers, the computer can represent only finitely many real numbers. It is common to use 64 bits to store each real number (with some of the bits being used to store the mantissa, and the rest used to store the exponent); then the largest real number is approximately 10308 . Numbers larger than this (or smaller than about −10308 ) result in an overflow. Overflows are considered to be serious errors and will often cause a program to stop executing. There is also a smallest positive real number, the number closest to zero that can be represented on the computer. Numbers smaller than this are often reset to zero, and an underflow occurs. This is often considered harmless, and no warning message is generated when it occurs on most computer systems. The smallest positive number is approximately 10−324 . When discussing the results of computer calculations we will often refer to the machine precision or the machine epsilon, denoted by mach . It represents the accuracy of the computer calculations. It is defined to be the smallest positive number  such that 1+ >1 when calculated on the computer. For example, if four decimal digits are available and rounding is used, then 1.000 + 0.0004 = 1.0004 → 1.000, whereas 1.000 + 0.0005 = 1.0005 → 1.001 > 1.000. In this simple case mach = 0.0005. When real numbers are stored using 64 bits, mach ≈ 10−16 . The machine epsilon represents how accurately calculations on the computer can be carried out. If a number is stored in the computer, then a relative error of up to mach can

i

i i

i

i

i

i

B.3. Big-O Notation, O(·)

book 2008/10/23 page 693 i

693

occur. For example, if we try to store 12.256 using only four decimal digits, then it would be represented as 12.26 with a relative error of |12.256 − 12.26| ≈ 0.0003, |12.256| which is less than the machine epsilon of 0.0005. Similarly, if two numbers are added, the result can have a relative error of as much as mach . These errors are called rounding errors. In general it is unreasonable to expect computed results to have a relative accuracy better than mach . In the discussion here, real numbers are stored using 64 bits. We will refer to these as double precision real numbers. This is the precision typically used for computations involving real numbers. Most computers are also capable of working with real numbers based on 32 bits, often referred to as single precision. If single precision is used, then the thresholds for overflow and underflow change, as does the value of mach . On some computers it is also possible to compute in extended precisions that use additional bits to store real numbers.

B.3

Big-O Notation, O(·)

“Big-O” notation is used to provide an order-of-magnitude estimate of a function. We will say that g(n) = O(f (n)) if for sufficiently large n, g(n) ≤ Cf (n), where C is some positive constant. For example, 3n3 + 2n2 + 5 = O(n3 ) because 3n3 + 2n2 + 5 ≤ 4n3 for n ≥ 3. This notation is often used when measuring the cost of an algorithm (see Chapter 9). If the cost of an algorithm is O(n3 ), then, for large n, doubling n increases the cost of the algorithm by about 8. In many cases, this information is sufficient to determine if an algorithm is practical or competitive for a given problem. This notation is also used when analyzing the accuracy of approximation formulas, such as the Taylor series. In this case it is more common to write that g(h) = O(f (h)) if g(h) ≤ Cf (h) as h → 0. (This is equivalent to the other definition for n ≡ 1/ h.) For example, if |h| < 1, then 1 = 1 + h + h 2 + h3 + · · · . 1−h From this we can conclude that 1 = 1 + h + O(h2 ) 1−h

i

i i

i

i

i

i

694

book 2008/10/23 page 694 i

Appendix B. Other Fundamentals

since for |h| < 12 , h2 + h3 + h4 + · · · = h2 (1 + h + h2 + · · ·)     1 1 2 2 = 2h2 . =h 0. A set S is open if every point x ∈ S is interior to S. For example, consider the sets S1 = { x : 0 < x } , S2 = { x : 0 ≤ x } ,

S3 = { x : 0 ≤ x < 2 } , S4 = { x : 0 ≤ x ≤ 2 } .

Then S1 is open but not bounded, S2 is closed but not bounded, S3 is bounded but neither closed nor open, and S4 is both closed and bounded. If f is a continuous function defined on a closed and bounded set S, then f takes on its minimum and maximum values somewhere on the set S. That is, there exist points xmin ∈ S and xmax ∈ S such that f (xmin ) = min f (x) x∈S

f (xmax ) = max f (x). x∈S

This is not guaranteed unless S is both closed and bounded. To see this, consider the function f (x) = x 2 on the sets Si defined above.

i

i i

i

i

i

i

700

book 2008/10/23 page 700 i

Appendix B. Other Fundamentals

This theorem is due to Weierstrass. For a proof of this result see the book by Buck (1978, reprinted 2003). Let F (x) be an m-vector of functions of x = (x1 , . . . , xn )T. Then F is Lipschitz continuous on an open set S if for some constant L, F (x) − F (y) ≤ L x − y for all x, y ∈ S. The following technical result is used in Chapter 11. Theorem B.6. Let F (x) be an m-vector of functions of x = (x1 , . . . , xn )T. Assume that the Jacobian of F is Lipschitz continuous on an open convex set S with constant L. Then for any x, y ∈ S,   F (y) − F (x) − ∇F (x)T(y − x) ≤ L y − x2 . 2 Proof. See the book by Dennis and Schnabel (1983, reprinted 1996).

B.9 The Implicit Function Theorem The concept of an “implicit” function arises in connection with constraints. For example, the constraint x1 + x2 − 1 = 0 could be rewritten as x1 = 1 − x2 , so the constraint implicitly determines x1 as a function of x2 . Once x2 is known, x1 is determined and can be eliminated from the problem. For simple constraints this is a straightforward procedure, but for systems of nonlinear constraints, such as x15 x2 x34 − 5x23 x33 − 7x13 + 5 = 0 x17 x23 x3 + 8x16 x22 + 8x32 − 2 = 0, it is less obvious how to express, say, x1 and x2 in terms of x3 , or even if the constraints implicitly define such functions. It is possible that one of the constraints is redundant, or reduces to a formula such as √ x1 = ± x3 which would not correspond to a single-valued function. The implicit function theorem states conditions under which such an implicit function is defined. The theorem does not give formulas for the implicit function, but just determines when such a function exists. The main requirement for the existence of such a function is that the Jacobian of the constraints be nonsingular. A version of the theorem is stated below; for a proof see the book by Ortega and Rheinboldt (1970, reprinted 2000). Theorem B.7. Consider the system of m equations in n variables gi (x1 , . . . , xn ) = 0 for i = 1, . . . , m,

i

i i

i

i

i

i

B.9. The Implicit Function Theorem

book 2008/10/23 page 701 i

701

and let xˆ be a point that satisfies these equations. Assume that the gradients of the functions { gi (x) } are continuous, and that the Jacobian matrix of the equations with respect to the variables x1 , . . . , xm , ⎛ ∂g1 (x) ˆ ˆ ⎞ ∂g1 (x) ··· ∂xm ⎟ ⎜ ∂x1 ⎟ ⎜ . .. . ⎟ ⎜ .. .. . ⎠ ⎝ ∂gm (x) ˆ ˆ ∂gm (x) ··· ∂x1 ∂xm T is nonsingular. Define yˆ = (xˆm+1 , . . . , xˆn ) and y = (xm+1 , . . . , xn )T. Then for some  > 0, if y−y ˆ <  there exist functions h1 (y), . . . , hm (y) such that (i) the functions { hi (y) } have ˆ for i = 1, . . . , m, and (iii) gi (h1 (y), . . . , hm (y), y) = continuous gradients, (ii) xˆi = hi (y) 0, for i = 1, . . . , m. To illustrate the theorem, we consider the equations g1 (x) = x15 x2 x34 − 5x23 x33 − 7x13 + 5 = 0 g2 (x) = x17 x23 x3 + 8x16 x22 + 8x32 − 2 = 0. These equations are satisfied at the point xˆ = (0, 2, 12 )T. At this point the Jacobian matrix with respect to the first two variables is     5x14 x2 x34 − 21x12 x15 x34 − 15x22 x33 0 0 . = −15/2 0 7x16 x23 x3 + 48x13 x22 3x17 x22 x3 + 16x16 x2 x=xˆ This matrix is singular, the conditions of the implicit function theorem are not satisfied, and so at this point the constraints cannot be rewritten to express the first two variables in terms of the third variable. For the equation g1 (x1 , x2 ) = x1 + x2 − 1 = 0 the Jacobian matrix with respect to the first variable is (1). This matrix is nonsingular for all values of x1 and x2 , so in this case an implicit function exists at all points where the constraint is satisfied. The theorem attempts to define the first m variables in terms of the remaining n − m variables. There is nothing special about the first m variables, since the variables could be relabeled so they could be put in any order. A slightly more general version of the implicit function theorem is used in Chapter 16; it can be found in the book by Bertsekas (1982, reprinted 1996).

i

i i

i

i

book 2008/10/23 page 702 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 703 i

Appendix C

Software

C.1

Software

In the last two decades, optimization software has improved dramatically, and this has made it possible to solve important problems in many areas of science and engineering. Advances in modern optimization algorithms and in computing technology enable us to solve problems with hundreds of thousands and even millions of variables and constraints. Even on a laptop computer using general-purpose optimization software, we can solve problems with thousands of variables and constraints. It is not feasible here to give a detailed discussion of optimization software. Instead we will discuss five categories of optimization software defined by their functionality. The first category is general-purpose software environments for scientific computing and data analysis. Examples include Excel, Mathematica, MATLAB® , and SAS. These software systems include optimization modules along with many other computational and graphical tools. They offer a broad range of capabilities, but may not offer the advanced capabilities necessary for solving large or especially challenging optimization problems. Also, because these systems are not specialized for optimization, they may lack modeling tools that make it easier to develop and implement an optimization model. The second software category is modeling software specifically oriented for optimization. This software makes it easy for a user to formulate an optimization problem and apply the whole arsenal of available optimization tools. The modeling software is usually based on some modeling language for describing optimization problems. A modeling language is a convenient way to convey an optimization problem to a solver. It makes it simple for a user to define objective functions and constraints of an optimization problem. The modeling language can then transform the model (represented in a form convenient to the user) into the mathematical form required by the optimization software. In the case of nonlinear models, the software can also derive formulas for derivative calculations. Also, by conveniently parameterizing a model, modeling languages provide a simple way to create optimization models based on data sets. This is particularly convenient in applications where the general model is fixed, but in which the data change regularly. Finally, once the model has been developed, it is straightforward to apply a variety of optimization algorithms in which cases 703

i

i i

i

i

i

i

704

book 2008/10/23 page 704 i

Appendix C. Software

where a small change in the model may require a different solver. This can occur, for example, when a nonlinear term is added to what had been a linear model. All these useful features allow a simple and fast way to model and solve optimization problems. The third software category is linear programming solvers. In this category we also include software for solving integer programming problems. There are several reasons why we separate linear programming software from more general optimization algorithms. One reason is that it is simpler to describe the models, since it is only necessary to specify vectors and matrices and not general nonlinear functions. Another is that software for linear programming includes many features beyond that typically provided by nonlinear optimization algorithms; for example, it will be common to have modules for sensitivity analysis. In addition, software for linear programming often includes capabilities for solving problems with integer variables, while nonlinear optimization software typically does not (with the exception of some software for quadratic programming). The fourth software category is quadratic programming solvers. Quadratic models are nonlinear, but they (like linear programs) can be described by specifying vectors and matrices rather than general nonlinear functions. Convex quadratic problems with linear constraints can be solved efficiently using an interior-point method or a modification of the simplex method. Therefore solvers for quadratic programming and linear programming are often combined in one software package that contains useful features such as the ability to handle integer variables or to perform sensitivity analysis. If these features are not required, then a convex quadratic program could be solved using software for nonlinear optimization. Since nonlinear optimization methods are often based on quadratic models, and often treat linear constraints separately from nonlinear constraints, nonlinear optimization software should often work well for convex quadratic programs as well. However, if it is necessary to solve a nonconvex quadratic problem or a problem with quadratic constraints—problems that may have local solutions—then it may be necessary to use general nonlinear optimization solvers. The last software category is general nonlinear optimization solvers. There are many varieties of nonlinear optimization models, and a corresponding array of nonlinear optimization algorithms. If the optimization problem is especially challenging to solve, the user may have to provide additional guidance in choosing an appropriate solver, or even in reformulating the model. Another issue to keep in mind is that it can be difficult to express a nonlinear optimization model in software. In some cases it may be easy to write the formulas for the model, for example, if the model includes a quadratic function. In other cases the model may be defined only in terms of other software. This can happen, for example, if the constraints include a differential equation that is solved using auxiliary algorithms. A guide to optimization algorithms and modeling languages is available through NEOS, a software system at the Argonne National Laboratory. In conclusion, we highlight several points. First, optimization software continues to be developed and improved at a rapid pace. Any recommendations that we might make in a book such as this would quickly go out of date. For this reason, it may be helpful to consult with online sources of information. For example, the Web site for the magazine OR/MS Today includes surveys of various types of software. Another source of guidance is the NEOS Server for Optimization Software. Links to these and other resources can be found on the Web site for this book (see http://www.siam.org/books/ot108).

i

i i

i

i

i

i

C.1. Software

book 2008/10/23 page 705 i

705

Second, modern linear programming software is able to solve problems with millions of variables and constraints. Moreover, the solver always finds the global solution to a linear programming problem. However, if the model includes integer-valued variables, it will typically be harder to solve, and this will limit the size of the problem that can be solved. In this case the default version of the solver may not compute the optimal solution, but instead may return an estimate that is only guaranteed to be within some tolerance of the optimal solution. The software is designed in this way because verifying optimality can be a time-consuming calculation when integer variables are included in the optimization model. In contrast, it is often relatively easy to compute a bound on the accuracy of the objective value. Third, nonlinear optimization problems may have multiple local solutions, and most optimization software will only guarantee that a local solution will be found. If the model includes nonlinear constraints, the software may not be able even to find a feasible point. Therefore a good initial guess in the neighborhood of the global solution can be helpful. In some cases it may be necessary to try several different initial guesses of the solution. Fourth, using a flexible optimization modeling environment with several different solvers is, in general, rewarding. Some problems can be easily solved by certain optimization algorithms but not others. As software improves, more and more optimization problems can be solved by general-purpose algorithms using the default settings of the algorithm parameters. But as this happens, users may become more ambitious and attempt to solve larger and more challenging optimization problems. Finally, besides choosing an appropriate solver or a modeling language, it may also be important to select an appropriate form of the optimization model. For example, subsection 1.7.6 described the catenary problem, which had several formulations. The formulations all had the same solution, but they had different computational properties. One of these formulations was easier to solve than the others. For challenging optimization problems, it may be necessary to investigate whether another formulation may be worthwhile.

i

i i

i

i

book 2008/10/23 page 706 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 707 i

Bibliography [1] J. Abadie, On the Kuhn-Tucker theorem, in Nonlinear Programming, J. Abadie, ed., North–Holland, Amsterdam, 1967, pp. 19–36. [2]

, The GRG method for nonlinear programming, in Design and Implementation of Optimization Software, H. Greenberg, ed., Sijthoff and Noordhoff, The Netherlands, 1978, pp. 335–362.

[3] J. Abadie and J. Carpentier, Généralisation de la méthode du gradient réduit de Wolfe au cas de contraintes non-linéaires, Note HRR 6678, Électricité de France, Paris, 1965. [4] C. Ablow and G. Brigham, An analog solution of programming problems, Operations Research, 3 (1955), pp. 388–394. [5] I. Adler, The expected number of pivots needed to solve parametric linear programs and the efficiency of the self-dual simplex method, manuscript, Department of Industrial Engineering and Operations Research, University of California, Berkeley, CA, 1983. [6] R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications, Prentice–Hall, Englewood Cliffs, NJ, 1993. [7] M. Aizerman, E. Braverman, and L. Rozonoer, Theoretical foundation of the potential function method in pattern recognition learning, Automation and Remote Control, 25 (1964), pp. 821–837. [8] M. Al-Baali, Descent property and global convergence of the Fletcher-Reeves method with inexact line search, IMA Journal on Numerical Analysis, 5 (1985), pp. 121–124. [9] E. D. Andersen and K. D. Andersen, Presolving in linear programming, Mathematical Programming, 71 (1995), pp. 221–245. [10] E. D. Andersen, J. Gondzio, C. Meszaros, and X. Xu, Implementation of interior point methods for large scale linear programming, in Interior Point Methods in Mathematical Programming, T. Terlaky, ed., Kluwer Academic Publishers, Dordrecht, The Netherlands, 1996, pp. 189–252. 707

i

i i

i

i

i

i

708

book 2008/10/23 page 708 i

Bibliography

[11] K. M. Anstreicher, A monotonic projective algorithm for fractional linear programming, Algorithmica, 1 (1986), pp. 483–498. [12] K. M. Anstreicher and R. A. Bosch, A new infinity-norm path following algorithm for linear programming, SIAM Journal on Optimization, 5 (1995), pp. 236–246. [13] M. Avriel, Nonlinear Programming: Analysis and Methods, Prentice–Hall, Englewood Cliffs, NJ, 1976. Reprinted by Dover Publications, Mineola, New York, 2003. [14] E. R. Barnes, A variation on Karmarkar’s algorithm for solving linear programming problems, Mathematical Programming, 36 (1986), pp. 174–182. [15] C. Barnhart, E. L. Johnson, G. L. Nemhauser, and P. H. Vance, Crew scheduling, in Handbook of Transportation Science, R. W. Hall, ed., KluwerAcademic Publishers, Dordrecht, The Netherlands, 1999, pp. 493–521. [16] R. H. Bartels and G. H. Golub, The simplex method of linear programming using LU decomposition, Communications of the ACM, 12 (1969), pp. 266–268. [17] J. Barutt and T. Hull, Airline crew scheduling: Supercomputers and algorithms, SIAM News, 23 (1990), p. 1. [18] M. S. Bazaraa, J. J. Jarvis, and H. D. Sherali, Linear Programming and Network Flows, Wiley, New York, 1990. [19] E. Beale, An alternative method for linear programming, Proceedings of the Cambridge Philosophical Society, 50 (1954), pp. 513–523. [20]

, Cycling in the dual simplex algorithm, Naval Research Logistics Quarterly, 2 (1955), pp. 269–275.

[21] D. P. Bertsekas, Constrained Optimization and Lagrange Multiplier Methods, Academic Press, New York, 1982. Reprinted by Athena Scientific, Belmont, MA, 1996. [22] D. P. Bertsekas and P. Tseng, The relax codes for linear minimum cost network flow problems, Annals of Operations Research, 13 (1988), pp. 125–190. [23] N. Bi´cani´c and K. Johnson, Who was “Raphson”?, International Journal for Numerical Methods in Engineering, 14 (1979), pp. 148–152. [24] R. E. Bixby, Implementing the simplex method: The initial basis, ORSA Journal on Computing, 4 (1993), pp. 267–284. [25] R. E. Bixby, J. W. Gregory, I. J. Lustig, R. E. Marsten, and D. F. Shanno, Very large-scale linear programming: A case study in combining interior point and simplex methods, Operations Research, 40 (1992), pp. 885–897. [26] R. G. Bland, New finite pivoting rules for the simplex method, Mathematics of Operations Research, 2 (1977), pp. 103–107. [27] R. G. Bland, D. Goldfarb, and M. J. Todd, The ellipsoid method: A survey, Operations Research, 29 (1981), pp. 1039–1091.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 709 i

709

[28] G. A. Bliss, Calculus of Variations, Open Court, Chicago, 1925. [29] P. T. Boggs and J. W. Tolle, Sequential quadratic programming, Acta Numerica, 4 (1995), pp. 1–52. [30] O. Bolza, Lectures on the Calculus of Variations, University of Chicago Press, Chicago, 1904. Reprinted by Scholarly Publishing Office, University of Michigan Library, Ann Arbor, MI, 2005. [31] K.-H. Borgwardt, The average number of pivot steps required by the simplex method is polynomial, Zeitschrift für Operations Research, 26 (1982), pp. 157–177. [32]

[33]

, Some distribution-independent results about the asymptotic order of the average number of pivot steps of the simplex method, Mathematics of Operations Research, 7 (1982), pp. 441–462. , The Simplex Method, Springer-Verlag, New York, 1987.

[34] B. Boser, I. M. Guyon, and V. Vapnik, A training algorithm for optimal margin classifiers, in Proceedings of the Fifth Annual Workshop on Computational Learning Theory, ACM, New York, 1992, pp. 144–152. [35] A. Brearly, G. Mitra, and H. Williams, Analysis of mathematical programming problems prior to applying the simplex method, Mathematical Programming, 8 (1975), pp. 54–83. [36] R. C. Buck, Advanced Calculus, (third edition), McGraw–Hill, New York, 1978. Reprinted by Waveland Press, Long Grove, IL, 2003. [37] C. J. Burges, A tutorial on support vector machines for pattern recognition, Data Mining and Knowledge Discovery, 2 (1998), pp. 121–167. [38] R. H. Byrd, M. E. Hribar, and J. Nocedal, An interior point algorithm for largescale nonlinear programming, SIAM Journal on Optimization, 9 (1999), pp. 877– 900. [39] R. H. Byrd, P. Lu, J. Nocedal, and C. Zhu, A limited memory algorithm for bound constrained optimization, SIAM Journal on Scientific Computing, 16 (1995), pp. 1190–1208. [40] R. H. Byrd, J. Nocedal, and Y.-X. Yuan, Global convergence of a class of quasiNewton methods on convex problems, SIAM Journal on Numerical Analysis, 24 (1987), pp. 1171–1190. [41] A. Cauchy, Mémoire sur la détermination des orbites des planètes et des comètes, Compte Rendu des Séances de L’Académie des Sciences, XXV (1847), pp. 401–413. [42]

, Mémoire sur les maxima et minima conditionnels, Compte Rendu des Séances de L’Académie des Sciences, XXIV (1847), pp. 757–763.

i

i i

i

i

i

i

710

book 2008/10/23 page 710 i

Bibliography

[43] A. Cauchy, Méthode générale pour la résolution des systèmes d’équations simultanées, Compte Rendu des Séances de L’Académie des Sciences, XXV (1847), pp. 536–538. [44] A. Charnes, Optimality and degeneracy in linear programming, Econometrica, 20 (1952), pp. 160–170. [45] K. Chen, Matrix Preconditioning Techniques and Applications, Cambridge University Press, Cambridge, UK, 2005. [46] J. Cheriyan and S. N. Maheshwari, Analysis of preflow push algorithms for maximum network flow, SIAM Journal on Computing, 18 (1989), pp. 1057–1086. [47] V. Chvátal, Linear Programming, W. H. Freeman and Company, New York, 1983. [48] T. F. Coleman, A superlinear penalty function method to solve the nonlinear programming problem, Ph.D. thesis, University of Waterloo, Waterloo, Ontario, Canada, 1979. [49] P. Concus, G. H. Golub, and D. P. O’Leary, A generalized conjugate gradient method for the numerical solution of elliptic partial differential equations, in Sparse Matrix Computations, J. Bunch and D. Rose, eds., Academic Press, New York, 1976, pp. 309–332. [50] A. R. Conn, Constrained optimization using a nondifferentiable penalty function, SIAM Journal on Numerical Analysis, 10 (1973), pp. 760–784. [51] A. R. Conn, N. I. M. Gould, and P. L. Toint, Trust-Region Methods, SIAM, Philadelphia, 2000. [52] A. R. Conn, N. M. Gould, and P. L. Toint, LANCELOT: A Fortran Package for Large-Scale Nonlinear Optimization, Springer-Verlag, Berlin, 1992. [53] S. D. Conte and C. W. de Boor, Elementary Numerical Analysis: An Algorithmic Approach, McGraw–Hill, New York, 1980. [54] R. Courant and D. Hilbert, Methods of Mathematical Physics, vol. I, Interscience, New York, 1953. Reprinted by Wiley-Interscience, New York, 1989. [55] R. Courant, Variational methods for the solution of problems of equilibrium and vibrations, Bulletin of the American Mathematical Society, 49 (1943), pp. 1–23. [56] N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods, Cambridge University Press, Cambridge, UK, 2000. [57] J. K. Cullum and R. A. Willoughby, Lanczos Algorithms for Large Symmetric Eigenvalue Computations. Vol. 1: Theory, Birkhäuser, Boston, 1985. Reprinted by SIAM, Philadelphia, 2002. [58] A. Curtis, M. J. Powell, and J. K. Reid, On the estimation of sparse Jacobian matrices, Journal of the Institute of Mathematics and Its Applications, 13 (1974), pp. 117–119.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 711 i

711

[59] G. B. Dantzig, Computational algorithm of the revised simplex method, Report RM 1266, The Rand Corporation, Santa Monica, CA, 1953. [60]

, Linear Programming and Extensions, Princeton University Press, Princeton NJ, 1963. Reprinted by Princeton University Press, 1998.

[61]

, Making progress during a stall in the simplex algorithm, Linear Algebra and Its Applications, 114/115 (1989), pp. 251–259.

[62] G. B. Dantzig and W. Orchard-Hays, The product form for the inverse in the simplex method, Mathematical Tables and Other Aids to Computation, 8 (1954), pp. 64–67. [63] G. B. Dantzig, A. Orden, and P. Wolfe, The generalized simplex method for minimizing a linear form under linear inequality restraints, Pacific Journal of Mathematics, 5 (1955), pp. 183–195. [64] G. B. Dantzig and P. Wolfe, The decomposition principle for linear programs, Operations Research, 8 (1960), pp. 101–111. [65] W. C. Davidon, Variable metric method for minimization, SIAM Journal on Optimization, 1 (1991), pp. 1–17. [66] T. A. Davis, Direct Methods for Sparse Linear Systems, SIAM, Philadelphia, 2006. [67] R. S. Dembo, S. C. Eisenstat, and T. Steihaug, Inexact Newton methods, SIAM Journal on Numerical Analysis, 19 (1982), pp. 400–408. [68] D. den Hertog, Interior point approach to linear, quadratic and convex programming, Kluwer Academic Publishers, Dordrecht, The Netherlands, 1994. [69] J. E. Dennis, Jr. and J. J. Moré, A characterization of superlinear convergence and its application to quasi-Newton methods, Mathematics of Computation, 28 (1974), pp. 549–560. [70]

, Quasi-Newton methods, motivation and theory, SIAM Review, 19 (1977), pp. 46–89.

[71] J. E. Dennis, Jr. and R. B. Schnabel, Numerical Methods for Unconstrained Optimization and Nonlinear Equations, Prentice–Hall, Englewood Cliffs, NJ, 1983. Reprinted by SIAM, Philadelphia, 1996. [72]

, A view of unconstrained optimization, in Optimization, G. Nemhauser, A. Rinnooy Kan, and M. J. Todd, eds., Elsevier, Amsterdam, 1989, pp. 1–72.

[73] E. W. Dijkstra, A note on two problems in connexion with graphs, Numerische Mathematik, 1 (1959), pp. 269–271. [74] I. Dikin, Iterative solution of problems of linear and quadratic programming, Doklady Akademiia Nauk SSSR, 174 (1967), pp. 747–748.

i

i i

i

i

i

i

712

book 2008/10/23 page 712 i

Bibliography

[75] A. S. Drud, CONOPT—a large-scale GRG code, ORSA Journal on Computing, 6 (1992), pp. 207–216. [76] J. Edmonds and R. M. Karp, Theoretical improvements in algorithmic efficiency of network flow problems, Journal of the ACM, 19 (1972), pp. 248–264. [77] K. Eisemann, The trim problem, Management Science, 3 (1957), pp. 279–284. [78] J. Farkas, Über die Theorie der einfachen Ungleichungen, Journal für die reine und angewandte Mathematik, 124 (1901), pp. 1–27. [79] A. V. Fiacco, Historical Survey of Sequential Unconstrained Methods for Solving Constrained Minimization Problems, Technical Paper RAC–TP–267, Research Analysis Corporation, 1967. [80] A. V. Fiacco and G. P. McCormick, Nonlinear Programming: Sequential Unconstrained Minimization Techniques, John Wiley and Sons, New York, 1968. Reprinted by SIAM, Philadelphia, 1990. [81] R. Fletcher, Practical Methods of Optimization, 2nd ed., Wiley, New York, 2000. [82] R. Fletcher, N. I. M. Gould, S. Leyffer, P. L. Toint, and A. Wächter, Global convergence of a trust-region SQP-filter algorithm for general nonlinear programming, SIAM Journal on Optimization, 13 (2002), pp. 635–659. [83] R. Fletcher and S. Leyffer, Nonlinear programming without a penalty function, Mathematical Programming, 91 (2002), pp. 239–270. [84] R. Fletcher, S. Leyffer, and P. L. Toint, A brief history of filter methods, SIAG/OPT Views and News, 18 (2007), pp. 2–12. [85] R. Fletcher and M. J. Powell, A rapidly convergent descent method for minimization, Computer Journal, 6 (1963), pp. 163–168. [86] R. Fletcher and C. Reeves, Function minimization by conjugate gradients, Computer Journal, 6 (1964), pp. 149–154. [87] C. A. Floudas and P. M. Pardalos, eds., Recent Advances in Global Optimization, Princeton University Press, Princeton, NJ, 1992. Reprinted by Princeton University Press, 2007. [88] L. Ford, Jr. and D. Fulkerson, A suggested computation for maximal multicommodity network flows, Management Science, 5 (1958), pp. 97–101. [89]

, Flows in Networks, Princeton University Press, Princeton, NJ, 1962.

[90] J. J. Forrest and D. Goldfarb, Steepest-edge simplex algorithms for linear programming, Mathematical Programming, 57 (1992), pp. 341–374. [91] J. J. Forrest and J. Tomlin, Updating triangular factors of the basis to maintain sparsity in the product-form simplex method, Mathematical Programming, 2 (1972), pp. 263–278.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 713 i

713

[92] R. Fourer, D. M. Gay, and B. W. Kernighan, AMPL: A Modeling Language for Mathematical Programming (second edition), Thomson/Brooks/Cole, Pacific Grove, CA, 2003. [93] M. Fredman and R. E. Tarjan, Fibonacci heaps and their uses in improved network optimization algorithms, Journal of the ACM, 34 (1987), pp. 596–615. [94] K. Frisch, The Logarithmic Potential Method of Convex Programming, Memorandum 13, University Institute of Economics, Oslo, Norway, 1955. [95] P. Gács and L. Lovász, Khachiyan’s algorithm for linear programming, Mathematical Programming Study, 14 (1981), pp. 61–68. [96] T. Gal, Postoptimal Analysis, Parametric Programming and Related Topics, McGraw–Hill, New York, 1979. [97] D. Gale, H. W. Kuhn, and A. W. Tucker, Linear programming and the theory of games, in Activity Analysis of Production and Allocation, T. Koopmans, ed., Wiley, New York, 1951, pp. 317–329. [98] S. I. Gass and T. Saaty, The computational algorithm for the parametric objective function, Naval Research Logistics Quarterly, 2 (1955), pp. 39–45. [99] C. F. Gauss, Theoria Motus Corporum Cœlestium in Sectionibus Conicus Solem Ambientum, Dover Press, New York, 1809. [100]

, Bestimmung des kleinsten Werthes der Summe x12 + x22 + · · · + xn2 = R 2 für m gegebene Ungleichungen u ≥ 0, in Werke, vol. X (part II), Gedruckt in der Dieterichschen Universitätsdruckerei (W.F. Kaestner), Göttingen, 1850–51, pp. 473–482.

[101] D. M. Gay, Computing optimal locally constrained steps, SIAM Journal on Scientific and Statistical Computing, 2 (1981), pp. 186–197. [102]

, A variant of Karmarkar’s algorithm for problems in standard form, Mathematical Programming, 37 (1987), pp. 81–90.

[103] I. Gelfand and S. Fomin, Calculus of Variations, Prentice–Hall, Englewood Cliffs, NJ, 1963. Reprinted by Dover Publications, New York, 2000. [104] A. George and J. Liu, Computer Solution of Large Sparse Positive Definite Systems, Prentice–Hall, Englewood Cliffs, NJ, 1981. [105] J. C. Gilbert and C. Lemaréchal, Some numerical experiments with variable storage quasi-Newton algorithms, Mathematical Programming, 45 (1989), pp. 407–436. [106] J. C. Gilbert and J. Nocedal, Global convergence properties of conjugate gradient methods for optimization, SIAM Journal on Optimization, 2 (1992), pp. 21–42.

i

i i

i

i

i

i

714

book 2008/10/23 page 714 i

Bibliography

[107] P. E. Gill and W. Murray, Quasi-Newton methods for unconstrained optimization, Journal of the Institute for Mathematics and Its Applications, 9 (1972), pp. 91–108. [108]

, Newton-type methods for unconstrained and linearly constrained optimization, Mathematical Programming, 28 (1974), pp. 311–350.

[109]

, Safeguarded Steplength Algorithms for Optimization Using Descent Methods, Report NAC 37, National Physical Laboratory, Teddington, England, 1974.

[110] P. E. Gill, W. Murray, M. A. Saunders, J. A. Tomlin, and M. H. Wright, On projected Newton barrier methods for linear programming and an equivalence to Karmarkar’s projective method, Mathematical Programming, 36 (1986), pp. 183–209. [111] P. E. Gill, W. Murray, and M. H. Wright, Practical Optimization, Academic Press, New York, 1981. [112]

, Numerical Linear Algebra and Optimization, vol. 1, Addison–Wesley, Redwood City, CA, 1991.

[113] P. C. Gilmore and R. E. Gomory, A linear programming approach to the cutting stock problem, Operations Research, 9 (1961), pp. 849–859. [114]

, A linear programming approach to the cutting stock problem—Part II, Operations Research, 11 (1963), pp. 863–888.

[115]

, Multistage cutting stock problems of two and more dimensions, Operations Research, 13 (1965), pp. 94–120.

[116] A. Goldberg, A New Max-Flow Algorithm, Technical Report MIT LCS TM–291, Laboratory for Computer Science, MIT, Cambridge, MA, 1985. [117] A. Goldberg and R. E. Tarjan, A new approach to the maximum flow problem, Journal of the ACM, 35 (1988), pp. 921–940. [118] D. Goldfarb and J. K. Reid, A practical steepest-edge simplex algorithm, Mathematical Programming, 12 (1977), pp. 361–371. [119] A. J. Goldman and A. W. Tucker, Theory of linear programming, in Linear Inequalities and Related Systems, H. W. Kuhn and A. W. Tucker, eds., Princeton University Press, Princeton, NJ, 1956, pp. 53–97. [120] H. Goldstine, A History of the Calculus of Variations from the 17th through the 19th Century, Springer-Verlag, New York, 1980. [121] G. H. Golub and C. Van Loan, Matrix Computations (third edition), The Johns Hopkins University Press, Baltimore, 1996. [122] J. Gondzio, Multiple centrality corrections in a primal-dual method for linear programming, Computational Optimization and Applications, 6 (1996), pp. 137–156. [123] C. C. Gonzaga, Path-following methods for linear programming, SIAM Review, 34 (1992), pp. 167–224.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 715 i

715

[124] R. Gopalan and K. T. Talluri, Mathematical models in airline schedule planning: A survey, Annals of Operations Research, 76 (1998), pp. 155–185. [125] F. J. Gould and J. W. Tolle, A necessary and sufficient qualification for constrained optimization, SIAM Journal on Applied Mathematics, 20 (1971), pp. 164–172. [126] J. Gregory and C. Lin, Constrained Optimization in the Calculus of Variations and Optimal Control Theory, Van Nostrand Reinhold, New York, 1992. Reprinted by Springer-Verlag, New York, 2007. [127] A. Griewank, Evaluating Derivatives: Principles and Techniques of Algorithmic Differentiation, SIAM, Philadelphia, 2000. [128] A. Griewank and G. F. Corliss, eds., Automatic Differentiation of Algorithms: Theory, Implementation, and Application, Proceedings of the First SIAM Workshop (Breckenridge, CO, January 6–8, 1991), SIAM, Philadelphia, 1991. [129] A. Griewank and P. L. Toint, Partitioned variable metric updates for large structured optimization problems, Numerische Mathematik, 39 (1982), pp. 119–137. [130] I. Griva and R. J. Vanderbei, Case studies in optimization: Catenary problem, Optimization and Engineering, 6 (2005), pp. 463–482. [131] M. Guignard, Generalized Kuhn–Tucker conditions for mathematical programming problems in a Banach space, SIAM Journal on Control, 7 (1969), pp. 232–241. [132] O. Güler and Y. Ye, Convergence behavior of interior-point algorithms, Mathematical Programming, 60 (1993), pp. 215–228. [133] W. W. Hager, Updating the inverse of a matrix, SIAM Review, 31 (1989), pp. 221–239. [134] M. Haimovich, The Simplex Method Is Very Good!—On the Expected Number of Pivot Steps and Related Properties of Random Linear Programs, preprint, Columbia University, New York, 1983. [135] E. Hansen and G. W. Walster, Global Optimization Using Interval Analysis (second edition), CRC Press, Boca Raton, FL, 2003. [136] P. M. Harris, Pivot selection methods of the Devex LP code, Mathematical Programming, 5 (1973), pp. 1–28. [137] M. R. Hestenes, Calculus of Variations and Optimal Control Theory, John Wiley & Sons, New York, 1966. [138]

, Multiplier and gradient methods, Journal of Optimization Theory and Applications, 4 (1969), pp. 303–320.

[139] M. R. Hestenes and E. Stiefel, Methods of conjugate gradients for solving linear systems, Journal of Research of the National Bureau of Standards, 49 (1952), pp. 409–436.

i

i i

i

i

i

i

716

book 2008/10/23 page 716 i

Bibliography

[140] N. Higham, Is fast matrix multiplication of practical use?, SIAM News, 23 (1990), pp. 12–14. [141] J. Ho, T. Lee, and R. Sundarraj, Decomposition of linear programs using parallel computation, Mathematical Programming, 42 (1988), pp. 391–405. [142] A. Hoffman, M. Mannos, D. Sokolowsky, and N. Wiegmann, Computational experience in solving linear programs, J. Soc. Indust. Appl. Math., 1 (1953), pp. 17–33. [143] A. J. Hoffman, Cycling in the Simplex Algorithm, Report 2974, National Bureau of Standards, Gaithersburg, MD, 1953. [144] R. A. Horn and C. R. Johnson, Topics in Matrix Analysis, Cambridge University Press, Cambridge, UK, 1991. Reprinted by Cambridge University Press, 1994. [145] R. Horst, P. M. Pardalos, and N. V. Thoai, Introduction to Global Optimization (second edition), Kluwer, Dordrecht, The Netherlands, 2000. [146] F. John, Extremum problems with inequalities as subsidiary conditions, in Studies and Essays Presented to R. Courant on his 60th Birthday, K. Friedricks, O. E. Neugebauer, and J. Stoker, eds., Wiley-Interscience, New York, 1948, pp. 187–204. [147] C. A. Johnson and A. Sofer, A primal-dual method for large-scale image reconstruction in emission tomography, SIAM Journal on Optimization, 11 (2001), pp. 691–715. [148] K. L. Jones, I. J. Lustig, J. M. Farvolden, and W. B. Powell, Multicommodity network flows: The impact of formulation on decomposition, Mathematical Programming, 62 (1993), pp. 95–117. [149] A. R. Kan and G. Timmer, Global optimization, in Optimization, G. Nemhauser, A. R. Kan, and M. J. Todd, eds., Elsevier, Amsterdam, 1989, pp. 631–659. [150] L. Kantorovich, Mathematical methods of organizing and planning production, Leningrad, 1939 (in Russian). English translation in Management Science, 6 (1959/1960), pp. 366–422. [151] N. Karmarkar, A new polynomial-time algorithm for linear programming, Combinatorica, 4 (1984), pp. 373–395. [152] L. G. Khachiyan, A polynomial algorithm in linear programming, Doklady Akademii Nauk SSSR, 244 (1979), pp. 1093–1096. [153] V. Klee and P. Kleinschmidt, Geometry of the Gass-Saaty parametric cost LP algorithm, Discrete and Computational Geometry, 5 (1990), pp. 13–26. [154] V. Klee and G. J. Minty, How good is the simplex algorithm?, in Inequalities, III, O. Shisha, ed., Academic Press, New York, 1972, pp. 159–175.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 717 i

717

[155] M. Kojima, S. Mizuno, and A. Yoshise, A primal-dual interior point algorithm for linear programming, in Progress in Mathematical Programming: Interior Point and Related Methods, N. Megiddo, ed., Springer-Verlag, New York, 1989, pp. 29–47. [156] T. G. Kolda, R. M. Lewis, and V. Torczon, Optimization by direct search: New perspectives on some classical and modern methods, SIAM Review, 45 (2003), pp. 385–482. [157] H. W. Kuhn, Nonlinear programming: A historical note, in History of Mathematical Programming, J. Lenstra, A. Rinnooy Kan, and A. Schrijver, eds., North–Holland, Amsterdam, 1991, pp. 82–96. [158] H. W. Kuhn and A. W. Tucker, Nonlinear programming, in Proceedings of the Second Berkeley Symposium on Mathematical Statistics and Probability, J. Neyman, ed., University of California Press, Berkeley, CA, 1951, pp. 481–492. [159] J. L. Lagrange, Oeuvres de Lagrange, vols. XI and XII, Gauthier-Villars, Paris, 1888–1889. [160] C. Lanczos, An iteration method for the solution of the eigenvalue problem of linear differential and integral operators, Journal of Research of the National Bureau of Standards, 45 (1950), pp. 255–282. [161] K. Lange and R. Carson, Reconstruction algorithms for emission and transmission tomography, Journal of Computer Assisted Tomography, 8 (1984), pp. 306–316. [162] L. Lasdon, A. Waren, A. Jain, and M. Ratner, Design and testing of a GRG code for nonlinear optimization, ACM Transactions on Mathematical Software, 4 (1978), pp. 34–50. [163] E. K. Lee and J. O. Deasy, Optimization in intensity modulated radiation therapy, SIAG/OPT Views and News, 17 (2006), pp. 20–32. [164] C. Lemaréchal, An extension of Davidon methods to non-differentiable problems, Mathematical Programming Study, 3 (1975), pp. 95–109. [165] C. Lemke, The dual method of solving the linear programming problem, Naval Research Logistics Quarterly, 1 (1954), pp. 36–47. [166] K. Levenberg, A method for the solution of certain problems in least squares, Quarterly of Applied Mathematics, 2 (1944), pp. 164–168. [167] L. Liberti and N. Maculan, eds., Global Optimization: From Theory to Implementation (Nonconvex Optimization and Its Applications), Springer-Verlag, New York, 2006. [168] D. Liu and J. Nocedal, On the limited memory BFGS method for large scale optimization, Mathematical Programming, 45 (1989), pp. 503–528. [169] D. G. Luenberger, Linear and Nonlinear Programming (second edition), Springer-Verlag, New York, 2003.

i

i i

i

i

i

i

718

book 2008/10/23 page 718 i

Bibliography

[170] I. J. Lustig, R. E. Marsten, and D. F. Shanno, The interaction of algorithms and architectures for interior point methods, in Advances in Optimization and Parallel Computing, P. Pardalos, ed., North–Holland, Amsterdam, 1992, pp. 190–205. [171]

, Computational experience with a globally convergent primal-dual predictorcorrector algorithm for linear programming, Mathematical Programming, 66 (1994), pp. 123–135.

[172]

, Interior point methods for linear programming: Computational state of the art, ORSA Journal on Computing, 6 (1994), pp. 1–14.

[173] J. N. Lyness and C. B. Moler, Numerical differentiation of analytic functions, SIAM Journal on Numerical Analysis, 4 (1967), pp. 202–210. [174] T. L. Magnanti and J. B. Orlin, Parametric linear programming and anti-cycling pivoting rules, Mathematical Programming, 41 (1988), pp. 317–325. [175] O. L. Mangasarian, Nonlinear Programming, McGraw–Hill, New York, 1969. Reprinted by SIAM, Philadelphia, 1994. [176] A. Manne, Programming of economic lot sizes, Management Science, 4 (1958), pp. 115–135. [177] H. M. Markowitz, The elimination form of the inverse and its application to linear programming, Management Science, 3 (1957), pp. 255–269. [178] H. M. Markowitz and G. P. Todd, Mean-Variance Analysis in Portfolio Choice and Capital Markets (revised reissue of 1987 edition), John Wiley and Sons, New York, 2000. [179] D. W. Marquardt, An algorithm for least-squares estimation of nonlinear parameters, SIAM Journal on Applied Mathematics, 11 (1963), pp. 431–441. [180] A. Mayer, Begründung der Lagrange’schen Multiplicatorenmethode in der Variationsrechnung, Mathematische Annalen, 26 (1886), pp. 74–82. [181] D. Mayne and N. Maratos, A first-order, exact penalty function algorithm for equality constrained optimization problems, Mathematical Programming, 16 (1979), pp. 303–324. [182] N. Megiddo, Pathways to the optimal set in linear programming, in Progress in Mathematical Programming: Interior Point and Related Methods, N. Megiddo, ed., Springer-Verlag, New York, 1989, pp. 131–158. [183] S. Mehrotra, On the implementation of a primal-dual interior point method, SIAM Journal on Optimization, 2 (1992), pp. 575–601. [184] J. Meijerink and H. V. D. Vorst, An iterative solution method for linear equation systems of which the coefficient matrix is a symmetric M-matrix, Mathematics of Computation, 31 (1977), pp. 148–162.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 719 i

719

[185] S. Mizuno, M. J. Todd, and Y. Ye, An adaptive-step primal-dual interior point algorithms for linear programming, Mathematics of Operations Research, 18 (1993), pp. 964–981. [186] R. Monteiro and I. Adler, Interior path following primal-dual algorithms: Part I: Linear programming, Mathematical Programming, 44 (1989), pp. 27–41. [187] J. J. Moré, Recent developments in algorithms and software for trust region methods, in Mathematical Programming: The State of the Art (Bonn, 1982), A. Bachem, M. Grötschel, and B. Korte, eds., Springer, Berlin, 1983, pp. 258–287. [188] J. J. Moré and D. C. Sorensen, Computing a trust region step, SIAM Journal on Scientific and Statistical Computing, 4 (1983), pp. 553–572. [189] J. J. Moré and D. Thuente, Line search algorithms with guaranteed sufficient decrease, ACM Transactions on Mathematical Software, 20 (1994), pp. 286–307. [190] W. Murray, Analytical expressions for the eigenvalues and eigenvectors of the Hessian matrices of barrier and penalty functions, Journal of Optimization Theory and Applications, 7 (1971), pp. 189–196. [191] K. G. Murty, Linear Programming, Wiley, New York, 1983. [192]

, Network Programming, Prentice–Hall, Englewood Cliffs, NJ, 1992. Reprinted by Prentice–Hall, 1998.

[193] S. G. Nash, Newton-type minimization via the Lanczos method, SIAM Journal on Numerical Analysis, 21 (1984), pp. 770–788. [194]

, Preconditioning of truncated-Newton methods, SIAM Journal on Scientific and Statistical Computing, 6 (1985), pp. 599–616.

[195]

, A survey of truncated-Newton methods, Journal of Computational and Applied Mathematics, 124 (2000), pp. 45–59.

[196] S. G. Nash and J. Nocedal, A numerical study of the limited memory BFGS method and the truncated-Newton method for large scale optimization, SIAM Journal on Optimization, 1 (1991), pp. 358–372. [197] S. G. Nash and A. Sofer, Assessing a search direction within a truncated-Newton method, Operations Research Letters, 9 (1990), pp. 219–221. [198]

, A general-purpose parallel algorithm for unconstrained optimization, SIAM Journal on Optimization, 4 (1991), pp. 530–547.

[199]

, Algorithm 711: BTN: Software for parallel unconstrained optimization, ACM Transactions on Mathematical Software, 18 (1992), pp. 414–448.

[200]

, A barrier method for large-scale constrained optimization, ORSA Journal on Computing, 5 (1993), pp. 40–53.

i

i i

i

i

i

i

720

book 2008/10/23 page 720 i

Bibliography

[201] J. Nazareth, Computer Solution of Linear Programs, Oxford University Press, New York, 1987. [202] J. Nelder and R. Mead, A simplex method for function minimization, Computing Journal, 7 (1965), pp. 308–313. [203] G. L. Nemhauser and L. A. Wolsey, Integer and Combinatorial Optimization, Wiley, New York, 1988. Reprinted by Wiley-Interscience, 1999. [204] A. S. Nemirovskii, Interior point polynomial time methods in convex programming, Lecture Notes, Faculty of Industrial Engineering and Management, Technion—The Israel Institute of Technology, Haifa, Israel, 1994. [205] Y. Nesterov and A. Nemirovskii, Interior-Point Polynomial Algorithms in Convex Programming, SIAM, Philadelphia, 1994. [206] Y. E. Nesterov and M. J. Todd, Primal-dual interior-point methods for self-scaled cones, SIAM Journal on Optimization, 8 (1998), pp. 324–364. [207] J. Nocedal, Theory of algorithms for unconstrained optimization, Acta Numerica, 1 (1992), pp. 199–242. [208] W. Orchard-Hays, Background, Development and Extensions of the Revised Simplex Method, Report RM 1433, The Rand Corporation, Santa Monica, CA, 1954. [209] J. B. Orlin, Genuinely Polynomial Simplex and Non-Simplex Algorithms for the Minimum Cost Flow Problem, Technical Report 1615–84, Sloan School of Management, MIT, Cambridge, MA, 1984. [210] J. B. Orlin, S. A. Plotkin, and É. Tardos, Polynomial dual network simplex algorithms, Mathematical Programming, 60 (1993), pp. 255–276. [211] J. M. Ortega and W. C. Rheinboldt, Iterative Solution of Nonlinear Equations in Several Variables, Academic Press, New York, 1970. Reprinted by SIAM, Philadelphia, 2000. [212] G. Ostrovskii, Y. Wolin, and W. Borisov, Über die Berechnung von Ableitungen, Wissenschaftliche Zeitschrift der Technischen Hochschule für Chemie, Leuna-Merseburg, 13 (1971), pp. 382–384. [213] C. C. Paige and M. A. Saunders, Solution of sparse indefinite systems of linear equations, SIAM Journal on Numerical Analysis, 12 (1975), pp. 617–629. [214] E. R. Panier and A. L. Tits, On combining feasibility, descent and superlinear convergence in inequality constrained optimization, Mathematical Programming, 59 (1993), pp. 261–276. [215] C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity, Prentice–Hall, Englewood Cliffs, NJ, 1982. Reprinted by Dover Publications, Mineola, NY, 1998.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 721 i

721

[216] B. N. Parlett, The Symmetric Eigenvalue Problem, Prentice–Hall, Englewood Cliffs, NJ, 1980. Reprinted by SIAM, Philadelphia, 1998. [217] A. Perry, A Class of Conjugate-Gradient Algorithms with a Two-Step VariableMetric Memory, Discussion paper 269, Center for Mathematical Studies in Economics and Management Science, Northwestern University, Evanston, IL, 1977. [218] T. Pietrzykowski, An exact potential method for constrained maxima, SIAM Journal on Numerical Analysis, 6 (1969), pp. 299–304. [219] R. Polyak, Modified barrier functions (theory and methods), Mathematical Programming, 54 (1992), pp. 177–222. [220] M. J. D. Powell, A method for nonlinear constraints in minimization problems, in Optimization, R. Fletcher, ed., Academic Press, New York, 1969, pp. 283–298. [221]

, A new algorithm for unconstrained optimization, in Nonlinear Programming, J. Rosen, O. Mangasarian, and K. Ritter, eds., Academic Press, New York, 1970, pp. 31–65.

[222]

, Convergence properties of a class of minimization algorithms, in Nonlinear Programming 2, O. Mangasarian, R. Meyer, and S. Robinson, eds., Academic Press, New York, 1975, pp. 1–27.

[223]

, Restart procedures for the conjugate gradient method, Mathematical Programming, 12 (1977), pp. 241–254.

[224]

, Problems related to unconstrained optimization, in Numerical Methods for Unconstrained Optimization, W. Murray, ed., Academic Press, London, New York, 1972, pp. 29–55.

[225] M. J. D. Powell and P. L. Toint, On the estimation of sparse Hessian matrices, SIAM Journal on Numerical Analysis, 16 (1979), pp. 1060–1074. [226] J. Renegar, A polynomial-time algorithm based on Newton’s method for linear programming, Mathematical Programming, 40 (1988), pp. 59–93. [227] T. R. Rockafellar, Conjugate Duality and Optimization, SIAM, Philadelphia, 1974. [228] C. Roos and J.-P. Vial, A polynomial method of approximate centers for linear programming, Mathematical Programming, 54 (1992), pp. 295–306. [229] C. Roos, J.-P. Vial, and T. Terlaky, Interior Point Methods for Linear Optimization (second edition), Springer-Verlag, New York, 2005. [230] J. B. Rosen, The gradient projection method for nonlinear programming, Part I. Linear constraints, J. Soc. Indust. Appl. Math., 8 (1960), pp. 181–217. [231] A. Ruszczynski and R. J. Vanderbei, Frontiers of stochastically nondominated portfolios, Econometrica, 71 (2003), pp. 1287–1297.

i

i i

i

i

i

i

722

book 2008/10/23 page 722 i

Bibliography

[232] Y. Saad, Krylov subspace methods for solving large unsymmetric linear systems, Mathematics of Computation, 37 (1981), pp. 105–126. [233]

, Iterative Methods for Sparse Linear Systems (second edition), SIAM, Philadelphia, 2003.

[234] T. Sauer, Numerical Analysis, Addison–Wesley, Boston, 2006. [235] R. B. Schnabel and E. Eskow, A new modified Cholesky factorization, SIAM Journal on Scientific and Statistical Computing, 11 (1990), pp. 1136–1158. [236] B. Schölkopf, C. J. Burges, and A. J. Smola, eds., Advances in Kernel Methods: Support Vector Learning, MIT Press, Cambridge, MA, 1999. [237] R. Schrader, Ellipsoid methods, in Modern Applied Mathematics—Optimization and Operations Research, B. Korte, ed., North–Holland, Amsterdam, 1982, pp. 265–311. [238]

, The ellipsoid method and its implications, OR Spektrum, 5 (1983), pp. 1–13.

[239] A. Schrijver, Theory of Linear and Integer Programming, John Wiley & Sons, New York, 1986. Reprinted by John Wiley & Sons, 1998. [240] D. F. Shanno, Conjugate-gradient methods with inexact searches, Mathematics of Operations Research, 3 (1978), pp. 244–256. [241] D. M. Shepard, M. C. Ferris, G. H. Olivera, and T. R. Mackie, Optimizing the delivery of radiation therapy to cancer patients, SIAM Review, 41 (1999), pp. 721–744. [242] L. A. Shepp and Y. Vardi, Maximum likelihood reconstruction for emission tomography, IEEE Transaction on Medical Imaging, 1 (1982), pp. 113–122. [243] N. Shor, On the structure of algorithms for the numerical solution of optimal planning and design problems, Ph.D. thesis, Cybernetics Institute, Academy of Sciences of the Ukrainian SSR, Kiev, 1964. [244] T. Simpson, Essays on Several Curious and Useful Subjects in Speculative and Mix’d Mathematicks, Illustrated by a Variety of Examples, London, 1740. [245] R. Skeel, Scaling for numerical stability in Gaussian elimination, Journal of the ACM, 26 (1979), pp. 494–526. [246] D. C. Sorensen, Newton’s method with a model trust region modification, SIAM Journal on Numerical Analysis, 19 (1982), pp. 409–426. [247] D. A. Spielman and S.-H. Teng, Smoothed analysis of algorithms: Why the simplex algorithm usually takes polynomial time, Journal of the ACM, 51 (2004), pp. 385–463. [248] W. Squire and G. Trapp, Using complex variables to estimate derivatives of real functions, SIAM Review, 40 (1998), pp. 110–112.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 723 i

723

[249] T. Steihaug, The conjugate gradient method and trust regions in large scale optimization, SIAM Journal on Numerical Analysis, 20 (1983), pp. 626–637. [250] U. H. Suhl and L. Suhl, Computing sparse LU factorizations for large-scale linear programming bases, ORSA Journal on Computing, 2 (1990), pp. 325–335. ´ [251] A. Swietanowski, A new steepest edge approximation for the simplex method for linear programming, Computational Optimization and Applications, 10 (1998), pp. 271–281. [252] É. Tardos, A strongly polynomial minimum cost circulation algorithm, Combinatorica, 5 (1985), pp. 247–255. [253] S. Thomas, Sequential Estimation Techniques for Quasi-Newton Algorithms, Ph.D. thesis, Cornell University, Ithaca, New York, 1975. [254] M. J. Todd, Semidefinite optimization, Acta Numerica, 10 (2001), pp. 515–560. [255] M. J. Todd and B. Burrell, An extension of Karmarkar’s algorithm for linear programming using dual variables, Algorithmica, 1 (1986), pp. 409–424. [256] P. L. Toint, Towards an efficient sparsity exploiting Newton method for minimization, in Sparse Matrices and Their Uses, I. Duff, ed., Academic Press, New York, 1981, pp. 57–87. [257] L. N. Trefethen and D. Bau, III, Numerical Linear Algebra, SIAM, Philadelphia, 1997. [258] A. W. Tucker, Dual systems of homogeneous linear equations, Annals of Mathematics Studies, 38 (1956), pp. 3–18. [259] A. M. Turing, On computable numbers, with an application to the Entscheidungsproblem, Proceedings of the London Mathematical Society, 42 (1936), pp. 230–265. [260] R. J. Vanderbei, Linear Programming: Foundations and Extensions (third edition), Springer, Berlin, 2007. [261] R. J. Vanderbei, M. Meketon, and B. Freedman, A modification of Karmarkar’s linear programming algorithm, Algorithmica, 1 (1986), pp. 395–407. [262] R. J. Vanderbei and D. F. Shanno, An interior-point algorithm for nonconvex nonlinear programming, Computational Optimization and Applications, 13 (1999), pp. 231–252. [263] V. Vapnik, ed., The Nature of Statistical Learning Theory (second edition), Springer-Verlag, New York, 1998. [264] J. von Neumann, Über ein ökonomisches Gleichungssystem und eine Verallgemeinerung des Brouwerschen Fixpunktsatzes, 1937. English translation in The Review of Economic Studies 13 (1945/1946), pp. 1–9.

i

i i

i

i

i

i

724

book 2008/10/23 page 724 i

Bibliography

[265] J. von Neumann, Discussion of a maximum problem, in John von Neumann (Collected Works), A. Taub, ed., vol. VI, Pergamon Press, Oxford, 1963, pp. 89–95. [266] A. Wächter and L. T. Biegler, On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming, Mathematical Programming, 106 (2006), pp. 25–57. [267] R. Wengert, A simple automatic derivative evaluation program, Communications of the ACM, 7 (1964), pp. 463–464. [268] D. Whiteside, ed., The Mathematical Papers of Isaac Newton, vols. 1–7, Cambridge University Press, Cambridge, UK, 1967–1976. [269] R. Wilson, A Simplicial Algorithm for Concave Programming, Ph.D. thesis, Harvard University, Cambridge, MA, 1963. [270] P. Wolfe, Convergence conditions for ascent methods, SIAM Review, 11 (1969), pp. 226–235. [271] H. Wolkowicz, R. Saigal, and L. Vandenberghe, eds., Handbook of Semidefinite Programming—Theory, Algorithms, and Applications, Kluwer Academic Publishers, Dordrecht, The Netherlands, 2000. [272] L. A. Wolsey, Integer Programming, Wiley-Interscience, New York, 1998. [273] M. H. Wright, Interior methods for constrained optimization, Acta Numerica, 1 (1992), pp. 341–407. [274]

, Some properties of the Hessian of the logarithmic barrier function, Mathematical Programming, 67 (1994), pp. 265–295.

[275] S. J. Wright, Primal-Dual Interior-Point Methods, SIAM, Philadelphia, 1997. [276] X. Xu, P. Hung, and Y. Ye, A simplified homogeneous self-dual linear programming algorithm and its implementation, Annals of Operations Research, 62 (1996), pp. 151–171. [277] H. Yamashita and H. Yabe, Superlinear and quadratic convergence of some primal-dual interior point methods for constrained optimization, Mathematical Programming, 75 (1996), pp. 377–397. [278]

, Quadratic convergence of a primal-dual interior point method for degenerate nonlinear optimization problems, Computational Optimization and Applications, 31 (2005), pp. 123–143.

[279] Y. Ye, Interior-Point Algorithms: Theory and Analysis, John Wiley and Sons, New York, 1997. [280] Y. Ye and M. Kojima, Recovering optimal dual solutions in Karmarkar’s polynomial algorithm for linear programming, Mathematical Programming, 39 (1987), pp. 305–317.

i

i i

i

i

i

i

Bibliography

book 2008/10/23 page 725 i

725

√ [281] Y. Ye, M. J. Todd, and S. Mizuno, An o( nL) iteration homogeneous and self-dual linear programming algorithm, Mathematics of Operations Research, 19 (1994), pp. 53–67. [282] T. J. Ypma, Historical development of the Newton–Raphson method, SIAM Review, 37 (1995), pp. 531–551. [283] D. Yudin and A. S. Nemirovskii, Informational complexity and efficient methods for the solution of convex extremal problems, Ekonomika i Matematicheskie Metody, 12 (1976), pp. 357–369. [284] N. Zadeh, A bad network problem for the simplex method and other minimum cost flow algorithms, Mathematical Programming, 5 (1973), pp. 255–266. [285]

, Near Equivalence of Network Flow Algorithms, Technical Report, Department of Operations Research, Stanford University, Stanford, CA, 1979.

[286] W. I. Zangwill, Algorithm for the Chebyshev problem, Management Science, 14 (1967), pp. 58–78. [287] Y. Zhang and R. A. Tapia, A superlinearly convergent polynomial primal-dual interior-point algorithm for linear programming, SIAM Journal on Optimization, 3 (1993), pp. 118–133.

i

i i

i

i

book 2008/10/23 page 726 i

i

i

i

i

i

i

i

i

i

book 2008/10/23 page 727 i

Index An italic e or f following a page number indicates that an example or a figure appears on that page.

artificial variable, 149–162, see also big-M method; two-phase method assignment problem, 276e, 277f, 275–277 augmented Lagrangian function, 627 augmented Lagrangian method, 628e, 626–640, 657 algorithm, 627–628 convergence, 631–634 dual interpretation, 635–638 automatic differentiation, see differentiation, automatic average-case cost, 301–302, see also complexity Avriel, Mordecai, 501, 502, 547

Abadie, J., 547, 598 Ablow, C.M., 657 active constraint, 44 active set, 44, 563 active-set method, 565e, 565f, 567e, 569f, 563–573, 598, 601 algorithm, 566–567 for linear programming, 570–572 adaptive algorithm, 433 adjacent extreme point, see extreme point, adjacent Adler, Ilan, 315, 324, 354 affine-scaling direction dual, 341 primal, 338 affine-scaling matrix, 336 affine-scaling method, 320, 336–344 dual, 340–343 primal, 339e, 337–343 primal-dual, 342–343 affine-scaling transformation, 336 Ahuja, Ravindra K., 293, 299, 300 Aizerman, M., 547 Al-Baali, M., 479 al-K¯aš¯ı, 448 Andersen, Erling D., 267, 354 Andersen, Knud D., 267 Anstreicher, Kurt M., 354 arc, 271 Archimedes, 16 Archimedes’ problem, 16, 16f Armijo condition, 377

backsubstitution, 667 backtracking line search, see line search, backtracking Barnes, Earl R., 354 Barnhart, Cynthia, 40 barrier function, 319, 603 inverse, 604 logarithmic, 320, 335, 344, 604 barrier method, 319–320, 335, 344, 604e, 602–610, 656–657 convergence, 613–617 dual, 353 ill-conditioning, 608e, 608–609, 618–619, 657 727

i

i i

i

i

i

i

728 Lagrange multiplier estimate, 607e, 606–608 stabilized, 622e, 619–623, 657 barrier parameter, 604 barrier term, 602 barrier trajectory, 345, 605, see also central path Bartels, Richard H., 252 basic feasible solution, 98, 107, 108e, 125, 126, see also extreme point adjacent, 112 degenerate, 110, 117 extended, 215–216 network model, 285–286 basic solution, 106–117 basic variable, 86, 107 basis, 107 adjacent, 112 basis matrix, 107 for the null space, see null-space matrix, basic matrix product form, see product form of the inverse representation, 240–259 representation in network, 280–287 basis recovery procedure, 329 Bau, David, III, 93 Bazaraa, Mikhtar S., 171 Beale, E.M.L., 171, 211 Bellman, Richard E., 657 Bernoulli, Jacob, 41 Bernoulli, John, 35, 544 Bertsekas, Dimitri P., 657, 701 BFGS update, see quasi-Newton method, BFGS Bic´ anic´ N., 447 Biegler, Lorenz T., 657 big-M method, 149, 156–162, 237, 292 big-O notation, 691, 693–694 binding constraint, see active constraint Bixby, Robert E., 41, 265 Bland’s rule, 166–167, 171 Bland, Robert G., 166, 167, 171, 313, 316 Bliss, Gilbert A., 545, 546

book 2008/10/23 page 728 i

Index block angular problem, 227, 238 Boggs, Paul T., 598 Bolza, O., 546 bordered-inverse formula, 621 Borgwardt, Karl-Heinz, 315–317 Borisov, W.W., 449 Bosch, Robert A., 354 Boser, B.E., 547 boundary of a constraint, 44 boundary of a set, 44 bounded set, 699 brachistochrone problem, 544 Braverman, E., 547 Brearly, A.L., 267 Brigham, G., 657 Broyden class, see quasi-Newton method, Broyden class Broyden, C.G., 417 Buck, R. Creighton, 691, 700 Burges, Christopher J.C., 41 Byrd, Richard H., 420, 449, 479, 657 calculus of variations, 543–546 canonical form for linear programming, see linear programming, canonical form Carpentier, J., 598 Carson, R., 41 catenary problem, 35, 41, 705 Cauchy, Augustin-Louis, 448, 545 centering direction, 347 central path, 320, 344, 345f, 345–346, see also barrier trajectory central trajectory, see central path chain rule, 698e, 698–699 characteristic equation, 661 Charnes, Abraham, 171 Chen, Ke, 479 Cheriyan, J., 299 Cholesky factorization, 448, 680e, 678–680 incomplete, 479 Chvátal, Vašek, 124, 171, 238, 300, 316 closed set, 699 coincidence event, 32 coincidence line, 32

i

i i

i

i

i

i

Index Coleman, Thomas F., 657 column generation, 214, 222–227, 270 compass search, 435e, 436f, 434–441 algorithm, 437 convergence, 437–441 complementary slackness linear programming, 183e, 182–184, 188 strict, 183, 189 nonlinear optimization, 496, 506 strict, 497, 506 complexity, 59, 301–305, 316 ellipsoid method, see ellipsoid method, complexity linear programming, see linear programming, complexity simplex method, see simplex method, complexity smoothed analysis, 317 computational complexity, see complexity computer arithmetic, 691–693, see also floating-point arithmetic IEEE standard, 691 Concus, Paul, 479 condition number, 664 conditioning, 683–686 cone, 117, 516 second-order, 655, 656f cone programming, 649, 658 convex, 649 second-order, 655 conjugate vectors, 453 conjugate-gradient method linear, 455e, 451–460, 478 algorithm, 454 preconditioned, 476e, 475–476 nonlinear, 451, 452, 467e, 466–470, 479 algorithm, 466 comparison with other methods, 469 Fletcher–Reeves, 469, 479 Hestenes–Stiefel, 469 Polak–Ribiére, 469, 479 Conn, Andrew R., 400, 657

book 2008/10/23 page 729 i

729 connected network, 281, 282f constraint linear, 77–93, 125 nonlinear, 483–547 constraint matrix, 101 constraint qualification, 546 Conte, Samuel D., 412 continuous function, 691, 699–700 control systems, 653 control theory, 543 convergence rate, 43, 60e, 58–62 r-linear, 439 linear, 59 quadratic, 60 superlinear, 59, 399 convex combination, 50 convex function, 49f, 52f, 48–54 strictly, 49 convex optimization problem, 49 convex set, 48f, 48–54 convexity, 48–54, see also convex function; convex set Corliss, George F., 449 Courant, Richard, 546, 656, 691 course outline, xvii–xxi introduction to optimization, xx–xxi linear programming, xvii–xviii nonlinear optimization, xviii–xx Cramer’s rule, 287 crash procedure, 265, see simplex method, initialization crew scheduling, 18–20, 40 Cristianini, Nello, 41 Cullum, Jane K., 478 Curtis, A.R., 449 cut in a network, 279e, 279 cutting plane, 651 cutting stock problem, 223f, 225e, 223–227, 270 cycle in a network, 281, 282f, 287 cycling, 164–171, 211 Dantzig, George B., 124, 171, 211, 270 data fitting, see least-squares data fitting Davidon, William C., 419, 448

i

i i

i

i

i

i

730 Davis, Timothy A., 689 de Boor, Carl W., 412 Deasy, Joseph O., 41 decomposition principle, 214, 233e, 227–240, 270 algorithm, 232 initialization, 236–237 degeneracy, 112, 115, 117, 125, 155, 155e, 195, 211, 222, 259, 265–266, 294, 497e, 498e, 497–499, 506 in network model, 295–299 demand in a network, 273 Dembo, Ron S., 478 den Hertog, D., 353, 657 Dennis, John E., Jr., 394, 399, 449, 700 dependent variable, 86 derivative, see differentiation derivative of a product, 697e, 697–698 derivative-free method, 450, see also compass search descent direction, 56 feasible, 58 Devex pricing, see pricing, Devex differentiation automatic, 366, 401, 422, 426–431, 449 forward mode, 429 reverse mode, 429 finite difference, 423e, 422–426, 429–430, 449 central difference, 425 complex difference, 426, 449 deficiencies, 432–434 forward difference, 423 sparse, 449 of product, see also chain rules gradient; Hessian; Jacobian Dijkstra, Edsger W., 299 Dikin, I.I., 336, 354 direction of a set, see direction of unboundedness direction of negative curvature, see negative curvature

book 2008/10/23 page 730 i

Index direction of unboundedness, 98, 112–115, 117–124 directional derivative, 382 discrete optimization, see integer programming dogleg strategy, see trust-region method, dogleg strategy dose-volume histogram, 31 double precision arithmetic, 693 Dow Jones Industrial average, 27 Drud, Arne S., 599 dual feasibility, 529 dual function, 524, 528 derivatives, 538e, 537–538 dual linear program, 173–179, see also duality, linear programming canonical form, 173–176 formation, 173–179 general form, 177e, 176–177 interpretation, 184–185 solution, 181, 182e standard form, 177 dual nonlinear program, see duality, nonlinear optimization dual price, 492 dual simplex method, 192e, 189–195, 211, 264, 300 algorithm, 191 big-M method, 195 phase-1 problem, 195 dual variable, 8, 125, see also Lagrange multiplier duality, 538, 545–547 linear programming, 279, see also dual linear program strong, 179–181, 185 theory, 179–189, 211 weak, 179e, 179–180 nonlinear conjugate, 527 nonlinear optimization, 177, 179, 484, 522–543, 547 convex, 532 Lagrangian, 526–532 local, 536e, 534–537 min-max, 523–526

i

i i

i

i

i

i

Index strong, 525–526, 531–532 weak, 524, 529e, 529–531 Wolfe, 533e, 532–533 support vector machine, 538–543, 547 duality gap, 530, 530e edge direction, 147e, 145–148 Edmonds, Jack, 299 efficient frontier, 27, 28f eigenvalue, 662e, 661–662 eigenvector, 662e, 661–662 Eisemann, K., 270 Eisenstat, Stanley C., 478 elementary matrix, 240–248, 257, 258 elementary permuation matrix, see permutation matrix, elementary elimination, see Gaussian elimination ellipsoid, 309e, 310f, 309–310 ellipsoid method, 312e, 312f, 308–314, 316, 319 algorithm, 311 complexity, 313 entering variable, 130, see also pricing mach , see machine epsilon equality-constrained problem linear, 79e, 79–80 Eskow, Elizabeth, 400 eta file, 241 eta vector, 241–247, 258 Euclid’s problem, 490 Euler, Leonhard, 544, 545 evaluation graph, 427, 427f exact line search, see line search, exact exact penalty function, 623 exact penalty method, see penalty method, exact Excel, 703 excess variable, 102 exponent in scientific notation, 692 exponential algorithm, 304–305, see also complexity extended basic feasible solution, see basic feasible solution, extended

book 2008/10/23 page 731 i

731 extreme point, 106–124, 228–240, 270 adjacent, 112 relation to basic feasible solution, 110–112 Fan, Ky, 657 Farkas’ lemma, 188, 211 Farkas, Julius, 211 Farvolden, Judith M., 270 feasible arc, 520 feasible curve, 484, 516e, 516f, 515–517 feasible descent direction, see descent direction, feasible feasible direction, 78f, 78–80, 147e, 145–148, 483, 484 feasible point, 43, 44 feasible region, see feasible set feasible set, 44, 45f feasible spanning tree solution, 285–286 feasible-point method, 78–79, 126, 549–599 Fermat, 3 Ferris, Michael C., 41 Fiacco, Anthony V., 353, 617, 618, 656, 657 fill-in, 673 filter, 513–514, 589, 590f filter method, 588–599 finite-difference derivative, see differentiation, finite difference finite-precision arithmetic, see floating-point arithmetic first-order conditions for optimality, see optimality conditions fixed variable, 269 fleet assignment, 40 fleet scheduling, 18, 20–21 Fletcher, Roger, 417, 419, 448, 469, 542, 599 floating-point arithmetic, 691 Floudas, Christodoulos A., 76 fluence map, 29 fluence matrix, 29 Fomin, S.V., 41 Ford, Jr., L.R., 270, 279, 299, 300

i

i i

i

i

i

i

732 Forrest, John J.H., 256, 264 Forrest–Tomlin update, 256 forward arc, 294 Fourer, Robert, 41 Fredman, M.L., 299 free constraint, 268 free variable, 102, 269 Freedman, B.A., 354 Frisch, K.R., 656, 657 Fritz–John conditions, 522, see also optimality conditions, constrained Fulkerson, D.R., 270, 279, 299, 300 full pricing, see pricing, full Gács, P., 309, 317 Gal, T., 211 Gale, David, 211 game theory, 185, 523–526 Gass, Saul I., 211 Gauss, Carl Friedrich, 448, 545, 666 Gaussian elimination, 302, 303, 666–676 accuracy, 685–686, 688 as matrix factorization, 669–676 costs, 667–668 for sparse matrix, 674e, 672–676 Gay, David M., 41, 354, 400 Gelfand, I.M., 41 general optimization algorithm, xiii, 56f, 54–58, 365 generalized inverse, see Penrose–Moore generalized inverse George, Alan, 689 Gilbert, Jean Charles, 479 Gill, Philip E., 93, 400, 443, 448, 449, 598 Gilmore, Phillis C., 270 Givens rotation, 681 global optimum, see optimum, global globalization strategy, 375, 511 Goldberg, A.V., 299 golden ratio, 412 Goldfarb, Donald, 264, 313, 316, 417 Goldman, Alan J., 211

book 2008/10/23 page 732 i

Index Golub, Gene H., 93, 252, 479, 558, 661, 682 Gomory, Ralph E., 270 Gondzio, J., 354 Gopalan, Ram, 40 Gould, F.J., 547 Gould, Nicholas I.M., 400, 599, 657 gradient, 691, 694e, 694–697 of a quadratic function, 696e, 696–697 gradient search, see steepest-descent method gradient-related direction, 377 Gram–Schmidt orthogonalization, 681 Gregory, John, 545 Gregory, John W., 41 Griewank, Andreas, 449, 479 Griva, Igor, 41 Guignard, Monique, 547 Güler, Osman, 354 Guyon, Isabel M., 547 Hager, William W., 689 Haimovich, M., 315 Halley, Edmond, 448 Hansen, Eldon, 76 hard constraint, 29 Harris, Paula M.J., 264 Herman, Gabor T., 41 Heron’s problem, 490 Hessian, 691, 694e, 694–697 of a quadratic function, 696e, 696–697 Hestenes, Magnus R., 456, 478, 479, 657 Hestenes–Stiefel, 469 Higham, N.J., 689 Hilbert, David, 546, 691 Ho, J.K., 270 Hoffman, Alan J., 171, 305 Horn, Roger A., 661 Horner, William George, 448 Horst, Reiner, 76 Householder reflection, 681 Hribar, Mary E., 657 Hung, P.F., 354 Huygens, Christian, 35

i

i i

i

i

i

i

Index ill-conditioned problem, 684 ill-conditioning, 265 implicit function theorem, 691, 700–701 IMRT (intensity modulated radiation treatment) planning, 18, 28–32, 41 inactive constraint, 44 incomplete Cholesky factorization, see Cholesky factorization, incomplete independent variable, 86 inequality-constrained problem linear, 79e, 79–80 infeasible linear program, 153e, 154f, 153–154 infimum, 523 integer programming, 19, 20, 286, 704, see also knapsack problem intensity modulated radiation treatment (IMRT) planning, 18, 28–32, 41 interior of a constraint, 44 interior point, 44, 320, 699 interior-point method, 125, 173, 302, 602 complexity, 321 computational aspects, 328–329, 354 dual, 320 linear programming, 319–354, see also affine-scaling method; Karmarkar’s method; path-following method; potential-reduction method primal, 320 primal-dual, 325e, 320–331 nonlinear, see primal-dual method, nonlinear inverse barrier function, see barrier function, inverse Jacobian, 691, 695e, 694–695 Jain, A., 598 Jarvis, John J., 171 John, Fritz, 522

book 2008/10/23 page 733 i

733 Johnson, Calvin A., 41 Johnson, Charles R., 661 Johnson, Ellis L., 40 Johnson, K.H., 447 Jones, Kim L., 270 Kantorovich, Leonid V., 171, 354 Karmarkar’s method, 301, 319, 321, 336, 353, 609, 640 Karmarkar, Narendra, 301, 319, 353 Karp, Richard M., 299 Karush, W., 545, 546 Karush–Kuhn–Tucker conditions, 545, see also optimality conditions, constrained kernel of a support vector machine, 541, 547 Kernighan, Brian W., 41 Khachiyan’s method, see ellipsoid method Khachiyan, Leonid G., 308, 317 KKT conditions, 506, see also optimality conditions, constrained Klee, Victor, 211, 306 Klee–Minty problem, 306e, 307f, 306–308, 313, 314, 316 Kleinschmidt, Peter, 211 knapsack problem, 225, 270 Kojima, M., 354 Kolda, Tamara G., 450 Krylov subspace, 458 Kuhn, Harold W., 211, 545, 546 Kuhn–Tucker conditions, 506 Kuhn-Tucker conditions, see also optimality conditions, constrained 1 exact penalty function, 623 Lagrange multiplier, 125, 177, 484, 488e, 488f, 487–494 computation of, 554–563 least-squares estimate, 558 via QR factorization, 559 via nonorthogonal projection, 559

i

i i

i

i

i

i

734 via orthogonal projection, 558–559 via variable reduction, 558 first-order estimate, 557 Lagrange, Joseph Louis, 493, 544–546 Lagrangian function, 484, 491–494, 504 Lanczos algorithm, 478 Lanczos, Cornelius, 478 Lange, K., 41 Lapack, 686 Lasdon, L.S., 598 LDLT factorization, 679e, 678–680 least-squares data fitting, 7, 12–14, 357 nonlinear, 14 least-squares problem, 682e, 681–683 leaving variable, 130 Lee, Eva K., 41 Lee, T.C., 270 Leibniz, Gottfried, 35 Lemaréchal, Claude, 479, 657 Lemke, C.E., 211 length of the input data (L), 303–305 level set, 378 Levenburg, K., 400 Lewis, Robert Michael, 450 lexicographic method, see perturbation lexicographic ordering, 168e, 167–171 Leyffer, Sven, 599 Liberti, Leo, 76 limited-memory quasi-Newton method, see quasi-Newton method, limited memory Lin, Cantian, 545 line search, 57, 57f, 375e backtracking, 378 exact, 382 naive, 376e line search method, 375–391, 400, 401 convergence theorem, 378–381 linear conjugate-gradient method, see conjugate-gradient method, linear linear constraint, 77–93, 125 linear convergence, see convergence rate, linear linear equations, 7–9, 664–668

book 2008/10/23 page 734 i

Index linear matrix inequality, 651 linear optimization, see linear programming linear programming, 8, 10–12, 41, 43, 86, 95–354 canonical form, 174e, 173–176 complexity, 211, 301–317 degeneracy, 112 duality, 173–211 geometry, 97–124 graphical solution, 98f, 97–100 multiple solutions, 145e, 144–145, 146f, 148, 149 self-dual formulation, 331–334, 354 sensitivity, 173, 196e, 195–204 general rules, 201 software, 704 standard form, 97, 98, 101e, 102e, 100–106 Lipschitz continuous function, 700 Liu, D.C., 479 Liu, J.W., 689 local optimum, see optimum, local logarithmic barrier function, see barrier function, logarithmic Lovász, L., 309, 317 LU factorization, 240, 250e, 258, 259, 669–676 updating, 253e, 253f, 248–259 Lu, Peihuang, 479 Luenberger, David G., 405, 406 Lustig, Irvin J., 41, 267, 270, 354, 657 Lyapunov function, 653 Lyapunov, Aleksandr M., 657 Lyness, James N., 449 Mathematica, 703 machine epsilon, 265, 692 Mackie, T. Rockwell, 41 Maclaurin, Colin, 448 Maculan, Nelson, 76 Magnanti, Thomas L., 211, 293, 299, 300 Maheshwari, S.N., 299 Mangasarian, Olvi L., 25, 547

i

i i

i

i

i

i

Index Manne, A.S., 270 Mannos, M., 305 mantissa, 692 Maratos effect, 581 Maratos, N., 657 Markowitz, Harry M., 25, 41, 673 Marquardt, D., 400 Marsten, Roy E., 41, 267, 354, 657 master problem, 229, 229e MATLAB® , 703 matrix, 661 dense, 665 indefinite, 677 negative definite, 677 negative semidefinite, 677 nonsingular, 665 positive definite, 677e, 677–678 positive semidefinite, 677 singular, 665 sparse, 665 square, 661 symmetric, 661 triangular, 667 upper triangular, 667 matrix inequality, 651 matrix norm, see norm, matrix maximum flow problem, 278e, 279f, 277–280 dual, 279 maximum likelihood estimation, 32 Mayer, A., 545, 546 Mayne, D.Q., 657 McCormick, Garth P., 353, 617, 656, 657 Mead, R., 450 mean-value theorem, 65 Megiddo, Nimrod, 354 Mehrotra, Sanjay, 330, 354 Meijerink, J.A., 479 Meketon, M.S., 354 merit function, 513–514, 577e, 577–580 Meszaros, C., 354 method of multipliers, 631, see also augmented Lagrangian method

book 2008/10/23 page 735 i

735 min-max duality, see duality, nonlinear optimization, min-max minimax problem, 510 minimizer global, 45, 45f, 49, 358 strict, 45, see also optimum, global local, 46, 46f, 49, 358 strict, 46, 358 minimum cost network flow problem, see network flow problem Minty, George J., 306 Mitra, G., 267 Mizuno, S., 354 model format, 260, 268–269 modeling language, 422, see also modeling software modeling software, 703–704 modified barrier function, 634 modified barrier method, 634–635 modified matrix factorization, 373e, 372–373, 399 Moler, Cleve B., 449 Monteiro, R.D.C., 324, 354 Moore–Penrose generalized inverse, see Penrose–Moore generalized inverse Moré, Jorge J., 395, 399, 400, 449 multidirectional search, see compass search multiplier-based method, see method of multipliers Murray, Walter, 93, 400, 443, 448, 449, 598, 657 Murty, Katta G., 124, 171, 299 Nash, Stephen G., 469, 478, 479, 657 Nazareth, J.L., 270 necessary conditions for optimality, see optimality conditions negative curvature, 374–375 Nelder, J.A., 450 Nelder–Mead method, 450 Nemhauser, George L., 40, 270, 286 Nemirovskii, Arkadii S., 317, 658

i

i i

i

i

i

i

736 NEOS server for optimization software, 704 Nesterov, Yurii, 658 Netlib, 478 network flow problem, 272e, 271–280 network model, 10, 16–17, 167, 227, 272f, 295f, 271–300 balanced, 274, 274e, 274f network problem, see network model network simplex method, 271, 287–295, 299–300 algorithm, 292 entering variable, 289, 290f initialization, 292, 293f operation counts, 292–293 New York Times, 308 Newton decrement, see proximity measure Newton direction, 323, 335 projected, 555 reduced, 551e, 550–552 Newton equations, 365 reduced, 550 Newton’s method history, 446–448 minimization, 8, 335, 357, 364–375, 401–403, 422, 452 classical, 365 computational costs, 365–366 convergence rate, 365–369, 399 modified, 371–375 reduced, 550–552, 582 nonlinear equations, 43, 67e, 69f, 73e, 67–76, 323–324, 335, 364 convergence, 69, 74 failure, 70, 71e, 74 multiple zeroes, 70, 70e, 72f, 76 Newton, Isaac, 446–448, 544 Newton–Raphson method, 447, see also Newton’s method Nocedal, Jorge, 400, 420, 448, 449, 469, 479, 657 node, 271 nonbasic variable, 86, 107

book 2008/10/23 page 736 i

Index nonbinding constraint, see inactive constraint nonconvex set, 48f nonlinear conjugate-gradient method, see conjugate-gradient method, nonlinear nonlinear optimization, 8, 14–18, 43, 86, 125, 357, 481–658 software, 704 within interior-point method, 319, 321, 334–336 nonlinear optimization problem, 125, 177 nonlinear programming, see nonlinear optimization nonorthogonal projection to compute Lagrange multiplier, 559 norm, 662–664 1-norm, 663–664 2-norm, 662–664 Euclidean, 662–664 infinity, 663–664 matrix, 664e, 662–664 induced, 663 vector, 663e, 662–664 null space, 80, 83f, 82–93 null-space equation, 550 null-space matrix, 83 basis matrix, 83 generation of, 86–93 numerical factorization, 328, 674 O’Leary, Dianne P., 479 Olivera, Gustavo C., 41 open set, 699 optimal basic feasible solution, 107, 117, 121–122, 125 optimality conditions, 44–48 constrained, 483–547 first-order necessary, 486e, 485–491, 495–497, 504, 506–508, 519 linear constraints, 484–491, 499e, 494–502

i

i i

i

i

i

i

Index nonlinear constraints, 505e, 506e, 502–510, 515–522 second-order necessary, 486e, 485–491, 496–497, 504, 506–508, 519–520 second-order sufficient, 486–491, 497–502, 504, 506–508, 519–520 unconstrained, 360e, 357–364 first-order necessary, 359 second-order necessary, 359 second-order sufficient, 359 optimization model, 3–41 optimum global, 43, 76, see also minimizer, global local, 43, 76, see also minimizer, local optimum, global, 76 OR/MS Today, 704 Orchard-Hays, William, 171, 270 Orden, Alex, 171 Orlin, James B., 211, 293, 299, 300 Ortega, James M., 74, 358, 400, 691, 700 orthogonal matrix factorization, see QR factorization orthogonal projection to compute Lagrange multiplier, 558–559 orthogonal projection matrix, 89f, 89–93 orthogonal subspace, 83 Ostrovskii, G.M., 449 Oughtred, William, 447 out-of-kilter method, 300 overflow, 692 Paige, Chris C., 478 Panier, Eliane R., 598 Papadimitriou, Christos H., 316, 352 parallel computing, 270, 432, 478 parametric linear programming, 205e, 209f, 204–211, 315 Pardalos, Panos M., 76 Parlett, Beresford N., 478 partial pricing, see pricing, partial

book 2008/10/23 page 737 i

737 partial separability, 479 path, 281, 282f path-following method, 320, 344–354 complexity, 347–352 long-step, 348 primal, 346e, 346–348 primal-dual, 345–346, 352, 354 short-step, 348–349 pattern classification, 18, 22 pattern search, see compass search penalization method, 601 penalty function, 601, 611 exact, 623, 624f ill-conditioning, 611–613 penalty method, 602–603, 612e, 610–613, 656–657 exact, 624e, 623–626, 657 exterior, 603, see also penalty method for inequality constraints, 613 ill-conditioning, 657 interior, 603, see also barrier method stabilized, 619–623, 657 penalty term, 602 Penrose–Moore generalized inverse, 559 permutation matrix, 248, 669 elementary, 249 Perry, A., 479 perturbation, 167–171, see also degeneracy PET (positron emission tomography) image reconstruction, 18, 33f, 32–35, 41 PET image reconstruction, see positron emission tomography (PET) image reconstruction phase-1 problem, 150–157, 159–161 phase-2 problem, 152, 154–156, 160, 161 Pietrzykowski, T., 657 pivot entry, 137 pivoting, 137, 668 complete, 668 Markowitz, 673–674 partial, 668

i

i i

i

i

i

i

738 Plotkin, Serge A., 300 Polak–Ribiére, 469, 479 polyhedral set, 77 polyhedron, 77 polynomial algorithm, 304–305, see also complexity portfolio optimization, 18, 25–28, 41 positive-definite matrix, see matrix, positive definite positron emission tomography (PET) image reconstruction, 18, 32–35, 41 potential-reduction method, 320 Powell, Michael J.D., 400, 419, 448, 449, 618, 657 Powell, Warren B., 270 preconditioning, 459, 475e, 474–479 preconditioning matrix, 475 predictor-corrector method, 321, 329–330, 354 preprocessing, 260, 267 pricing, 140, 260–264, 270 Devex, 264 full, 260 partial, 260 steepest-descent, 261 steepest-edge, 263e, 260–264, 269 primal function, 524, 527 primal linear program, 173 primal-dual method, see also interior-point method, primal-dual nonlinear, 643e, 640–649, 657 algorithm, 642–643 convergence, 645–647 primal-dual simplex method, 300 principle of least action, 543 product form of the inverse, 244e, 240–247, 257, 270 projected gradient, 485 projected gradient method, 556 projected Hessian, 485 projection matrix, 90 projective method, see Karmarkar’s method proximity measure, 348–349

book 2008/10/23 page 738 i

Index pseudoinverse, see Penrose–Moore generalized inverse QR factorization, 86, 90–93, 683e, 681–683 to compute Lagrange multiplier, 559 quadratic convergence, see convergence rate, quadratic quadratic function, 8, 9f gradient, 696e, 696–697 Hessian, 696e, 696–697 quadratic penalty function, 577 quadratic program, 18, 574 quadratic programming software, 704 quadratic-loss function, 611 quasi-convex function, 53 quasi-Newton method, 401–402, 413e, 411–422, 448–449, 451 algorithm, 415 BFGS, 418e, 417–420, 445, 448, 449, 470 Broyden class, 419 convergence, 419–420 DFP, 419 for constrained optimization, 553 inverse update, 449 limited memory, 451, 452, 471e, 469–474, 477, 479 for constrained optimization, 553 symmetric rank-one, 416e, 414–417, 448 update formula, 414 radiotherapy, 28 range space, 83f, 82–86 Raphson, Joseph, 447 ratio test, 81, 81e, 131 Ratner, M., 598 reduced cost, 125, 130 reduced function, 485, 485e reduced gradient, 485 reduced gradient method, 549, 583e, 581–588, 598–599 convergence, 585–588 reduced Hessian, 485

i

i i

i

i

i

i

Index reduced Newton method, see Newton’s method, minimization Reeves, C.M., 469 refactorization, 252, see also LU factorization, updating regularity, 489, 496, 503e, 503–504, 508e, 518–519, 546–547 regularization, 644 Reid, John K., 264, 449 relative error, 692 relative interior point, 44 relaxation, 7, 20, 651 Renegar, James, 354 representation theorem, 120, 228 restart procedure, 479 reverse arc, 294 revised simplex method, see simplex method, revised Rheinboldt, Werner C., 74, 358, 400, 691, 700 right inverse, 559e, 557–563 Rinnooy Kan, A.H.G., 76 Rockafellar, Tyrrell R., 547 Roos, C., 353, 354 root node, 292 Rosen, J.B., 598 rounding error, 693, see floating-point arithmetic Rozonoer, L., 547 Ruszczynski, Andrzej, 41 Saad, Yousef, 478, 689 Saaty, Thomas, 211 saddle point, 486 saddle-point condition, 525 Saigal, Romesh, 657 SAS, 703 Sauer, Timothy, 691 Saunders, Michael A., 478 scaling, 260, 266–267, 270, 444e, 444–445 Schnabel, Robert B., 394, 400, 449, 700 Schölkopf, Bernhard, 41 Schrader, R., 316 Schrijver, Alexander, 124, 171, 316 SDP, see semidefinite programming

book 2008/10/23 page 739 i

739 search direction, 55 secant condition, 412 secant method, 412e, 411–412, see also quasi-Newton method second-order conditions for optimality, see optimality conditions second-order cone, see cone, second-order second-order Lorenz cone, 655, 656, see cone, second-order selective orthogonalization, 478 self-concordance, 658 semidefinite programming, 649–658 complementarity, 654 dual standard form, 650 duality, 653–654 primal standard form, 650 semidefinite relaxation, 651 sensitivity, 489, 492e, 683–686, 704, see also linear programming, sensitivity separating hyperplane, 22, 23, 24f separation margin, 22 sequential quadratic programming (SQP), 549, 575e, 573–581, 598 computational costs, 576 convergence, 576–580 filter method, 594e, 591–597 algorithm, 593–594 convergence, 596–597 set constraint, 527 shadow price, 125, 173, 492, see also dual variable shadow vertex method, 210, 211, 315, see also parametric linear programming Shanno, David F., 41, 267, 354, 417, 479, 657 shape optimization, 18, 35–41 Shawe-Taylor, John, 41 Shepard, David M., 41 Shepp, Larry A., 41 Sherali, Hanif D., 171 Sherman–Morrison formula, 470, 687e, 686–689

i

i i

i

i

i

i

740 Sherman–Morrison–Woodbury formula, 688–689 Shor, N.Z., 317 shortest path problem, 277e, 277, 278f, 280, 299 simplex method, 8, 97, 127f, 125–171, 301–302 algorithm, 131, 132e bounded variable, 213, 219e algorithm, 218 comparison with interior-point method, 328–329 complexity, 302 average case, 316, 317 average-case, 314 worst case, 305–308 computational efficiency, 259–270 degeneracy, 162e, 162–171 dual form, see dual simplex method enhancements, 213–270 general formulas, 129e, 129–134 implementation, 214 initialization, 149–162, 260, 264–265 interpreted as active-set method, 570–572 operation counts, 140–141 primal-dual form, see primal-dual simplex method revised, 139, 171 software, 260, 267, 269 stability, 259–270 tableau, 135–141 deficiencies, 139–141 termination, 162–171 tolerance, 260, 265–266 upper bound, 214–222 simplex multipliers, 129 Simpson, Thomas, 447, 448 simulation-based optimization, 432–434 single precision arithmetic, 693 singularity, 665 sink node, 272 Skeel, Robert, 267 skew symmetric matrix, 331 slack variable, 102

book 2008/10/23 page 740 i

Index Slater condition, 547 Smola, Alexander J., 41 smoothed analysis, see complexity, smoothed analysis Sofer, Ariela, 41, 478, 657 soft constraint, 29 software, 703–705 Sokolowsky, D., 305 Sorensen, D.C., 400 source node, 272 spanning tree, 283f, 280–287 spanning tree solution, 285–287 sparse matrix storage, 675–676, 689 sparsity, 126, 213, 247–248, 256, 275, 366, 401, 449, 452, 456, 665, 689 spectral decomposition, 662 Spielman, Daniel A., 317 SQP, see sequential quadratic programming Squire, William, 449 stalling, 167, 294 standard form for linear programming, see linear programming, standard form stationary point, 46, 358, 359f, 486 steepest-descent direction reduced, 552e, 552–553 steepest-descent for linear programming, 261 steepest-descent method, 336, 404e, 401–411, 445 convergence, 406e, 407f, 405–407, 408f reduced, 552–553 steepest-descent pricing for linear programming, see pricing, steepest-descent steepest-edge pricing, see pricing, steepest-edge Steiglitz, Kenneth, 316, 352 Steihaug, Trond, 400, 478 step length, 55 Stiefel, E., 456, 478, 479 Stirling’s formula, 305 Street, W. Nick, 25

i

i i

i

i

i

i

Index strong duality, see duality strongly feasible basis, 295f, 295–299 strongly feasible tree, see strongly feasible basis strongly polynomial algorithm, 300 subnetwork, 281, 281f sufficient conditions for optimality, see optimality conditions sufficient decrease condition, 57, 378f sufficient descent condition, 377–378 Suhl, L.M., 673 Suhl, Uwe H., 673 Sundarraj, R.P., 270 superlinear convergence, see convergence rate, superlinear supply in a network, 273 support vector, 23 support vector machine, 18, 22–25, 41 duality, see duality, support vector machine supremum, 523 surface, 515 ´ Swietanowski, Artur, 264 symbolic factorization, 328, 674 symmetric rank-one update, see quasi-Newton method, symmetric rank-one Talluri, Kalyan T., 40 tangent cone, 517f, 517–519 Tapia, Richard A., 354 Tardos, Éva, 300 Tarjan, Robert E., 299 Taylor series, 63e, 64e, 64f, 62–66, 358, 483 remainder form, 65 Taylor, Brook, 448 Ten, Shang-Hua, 317 Terlaky, T., 353 termination rules for unconstrained minimization, 441–446 Thoai, Nguyen V., 76 Thomas, S.W., 400 Thuente, David, 400 time-line network, 20, 21f Timmer, G.T., 76

book 2008/10/23 page 741 i

741 Tits, André L., 598 Todd, G. Peter, 41 Todd, Michael J., 313, 316, 354, 657, 658 Toint, Philippe L., 400, 449, 478, 479, 599, 657 Tolle, Jon W., 547, 598 Tomlin, John A., 256 Torczon, Virginia, 450 totally unimodular, 287 training data, 22 transportation problem, 275e, 275, 276f, 280 transshipment node, 272 Trapp, George, 449 tree, 283f, 281–286 Trefethen, Lloyd N., 93 triangular matrix, 667 truncated-Newton method, 451, 452, 463e, 460–466, 469, 477–479, 657 for constrained optimization, 553, 554 truncation error, 423 trust-region method, 392f, 393e, 391–401 algorithm, 392–393 convergence theorem, 395–398, 400 dogleg strategy, 400 trust-region subproblem, 391 Tucker, Albert W., 211, 354, 545, 546 Turing machine, 303 Turing, Alan M., 303 two-phase method, 149–156, 159–162, 237–238, 256, 292 unbounded linear program, 134e, 135f, 134–135 unconstrained minimization, 14, 549 unconstrained optimization, 355–479 underflow, 692 unimodular, 287 unrestricted variable, see free variable URL for this book, xiv

i

i i

i

i

i

i

742 Van Der Vorst, H.A., 479 Van Loan, Charles, 93, 558, 661, 682 Vance, Pamela H., 40 Vandenberghe, Lieven, 657 Vanderbei, Robert J., 41, 270, 353, 354, 657 Vapnik, Vladimir, 41, 547 Vardi, Yehuda, 41 variable reduction, 87e, 86–88, 91 to compute Lagrange multiplier, 558 variable reduction method to compute Lagrange multiplier, 558, 663e, 662–664 vector, 661 vector norm, see norm, vector vertex, 107 degenerate, 112 Vial, J.-Ph., 353, 354 Viète, Francois, 447 von Neumann, John, 171, 211 voxel, 29, 32 Wächter, Andreas, 599, 657 Walster, G. Wilson, 76 Waren, A.D., 598 weak duality, see duality Web site for this book, xiv Weierstrass, Karl, 545, 546, 700 Wengert, R.E., 449 Whiteside, D. T., 446–448 Wiegmann, N., 305 Williams, H.P., 267 Willoughby, Ralph A., 478 Wilson, R.B., 598

book 2008/10/23 page 742 i

Index Wisconsin Diagnosis Breast Cancer database, 25 Wolberg, William H., 25 Wolfe condition, 378, 383f, 384e, 383–385, 387, 388, 400 weak, 388, 389 Wolfe dual, 532 Wolfe, Philip, 171, 270, 400 Wolin, Ju.M., 449 Wolkowicz, Henry, 657 Wolsey, Laurence A., 40, 270, 286 working set, 564e, 563–564 worst-case cost, 301–302, see also complexity Wright, Margaret H., 93, 400, 443, 449, 598, 618, 656, 657 Wright, Stephen J., 353 Xu, X., 354 Yabe, Hiroshi, 657 Yamashita, Hiroshi, 657 Ye, Yinyu, 353, 354 Yoshise, A., 354 Ypma, Tjalling J., 447 Yuan, Ya-Xiang, 420, 449 Yudin, D.B., 317 Zadeh, N., 300 Zangwill, Willard I., 657 zero-sum game, 523, 524e, see also game theory Zhang, Yin, 354 Zhu, Ciyou, 479 zigzagging, 570, 570f

i

i i

i